xref: /titanic_51/usr/src/cmd/krb5/kadmin/dbutil/dump.c (revision a31148363f598def767ac48c5d82e1572e44b935)
1 /*
2  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
3  * Use is subject to license terms.
4  */
5 
6 /*
7  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
8  *
9  *	Openvision retains the copyright to derivative works of
10  *	this source code.  Do *NOT* create a derivative of this
11  *	source code before consulting with your legal department.
12  *	Do *NOT* integrate *ANY* of this source code into another
13  *	product before consulting with your legal department.
14  *
15  *	For further information, read the top-level Openvision
16  *	copyright which is contained in the top-level MIT Kerberos
17  *	copyright.
18  *
19  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
20  *
21  */
22 
23 
24 /*
25  * admin/edit/dump.c
26  *
27  * Copyright 1990,1991 by the Massachusetts Institute of Technology.
28  * All Rights Reserved.
29  *
30  * Export of this software from the United States of America may
31  *   require a specific license from the United States Government.
32  *   It is the responsibility of any person or organization contemplating
33  *   export to obtain such a license before exporting.
34  *
35  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
36  * distribute this software and its documentation for any purpose and
37  * without fee is hereby granted, provided that the above copyright
38  * notice appear in all copies and that both that copyright notice and
39  * this permission notice appear in supporting documentation, and that
40  * the name of M.I.T. not be used in advertising or publicity pertaining
41  * to distribution of the software without specific, written prior
42  * permission.  Furthermore if you modify this software you must label
43  * your software as modified software and not distribute it in such a
44  * fashion that it might be confused with the original M.I.T. software.
45  * M.I.T. makes no representations about the suitability of
46  * this software for any purpose.  It is provided "as is" without express
47  * or implied warranty.
48  *
49  *
50  * Dump a KDC database
51  */
52 
53 #include <stdio.h>
54 #include <k5-int.h>
55 #include <kadm5/admin.h>
56 #include <kadm5/server_internal.h>
57 #include <kdb.h>
58 #include <com_err.h>
59 #include <libintl.h>
60 #include "kdb5_util.h"
61 #if defined(HAVE_REGEX_H) && defined(HAVE_REGCOMP)
62 #include <regex.h>
63 #endif	/* HAVE_REGEX_H */
64 
65 /*
66  * Needed for master key conversion.
67  */
68 extern krb5_keyblock master_key;
69 extern krb5_principal master_princ;
70 static int			mkey_convert;
71 static krb5_keyblock		new_master_key;
72 
73 static int	backwards;
74 static int	recursive;
75 
76 /*
77  * Use compile(3) if no regcomp present.
78  */
79 #if	!defined(HAVE_REGCOMP) && defined(HAVE_REGEXP_H)
80 #define	INIT		char *sp = instring;
81 #define	GETC()		(*sp++)
82 #define	PEEKC()		(*sp)
83 #define	UNGETC(c)	(--sp)
84 #define	RETURN(c)	return(c)
85 #define	ERROR(c)
86 #define	RE_BUF_SIZE	1024
87 #include <regexp.h>
88 #endif	/* !HAVE_REGCOMP && HAVE_REGEXP_H */
89 
90 struct dump_args {
91     char		*programname;
92     FILE		*ofile;
93     krb5_context	kcontext;
94     char		**names;
95     int			nnames;
96     int			verbose;
97 };
98 
99 static krb5_error_code dump_k5beta_iterator (krb5_pointer,
100 					     krb5_db_entry *);
101 static krb5_error_code dump_k5beta6_iterator (krb5_pointer,
102 					      krb5_db_entry *);
103 static krb5_error_code dump_k5beta6_iterator_ext (krb5_pointer,
104 						  krb5_db_entry *,
105 						  int);
106 static krb5_error_code dump_iprop_iterator (krb5_pointer,
107 						  krb5_db_entry *);
108 static krb5_error_code dump_k5beta7_princ (krb5_pointer,
109 					   krb5_db_entry *);
110 static krb5_error_code dump_k5beta7_princ_ext (krb5_pointer,
111 					       krb5_db_entry *,
112 					       int);
113 static krb5_error_code dump_k5beta7_princ_withpolicy
114 			(krb5_pointer, krb5_db_entry *);
115 static krb5_error_code dump_iprop_princ (krb5_pointer,
116 					       krb5_db_entry *);
117 static krb5_error_code dump_ov_princ (krb5_pointer,
118 				      krb5_db_entry *);
119 static void dump_k5beta7_policy (void *, osa_policy_ent_t);
120 
121 typedef krb5_error_code (*dump_func)(krb5_pointer,
122 				     krb5_db_entry *);
123 
124 static int process_k5beta_record (char *, krb5_context,
125 				  FILE *, int, int *);
126 static int process_k5beta6_record (char *, krb5_context,
127 				   FILE *, int, int *);
128 static int process_k5beta7_record (char *, krb5_context,
129 				   FILE *, int, int *);
130 static int process_ov_record (char *, krb5_context,
131 			      FILE *, int, int *);
132 typedef krb5_error_code (*load_func)(char *, krb5_context,
133 				     FILE *, int, int *);
134 
135 typedef struct _dump_version {
136      char *name;
137      char *header;
138      int updateonly;
139      int create_kadm5;
140      dump_func dump_princ;
141      osa_adb_iter_policy_func dump_policy;
142      load_func load_record;
143 } dump_version;
144 
145 dump_version old_version = {
146      "Kerberos version 5 old format",
147      "kdb5_edit load_dump version 2.0\n",
148      0,
149      1,
150      dump_k5beta_iterator,
151      NULL,
152      process_k5beta_record
153 };
154 dump_version beta6_version = {
155      "Kerberos version 5 beta 6 format",
156      "kdb5_edit load_dump version 3.0\n",
157      0,
158      1,
159      dump_k5beta6_iterator,
160      NULL,
161      process_k5beta6_record
162 };
163 dump_version beta7_version = {
164      "Kerberos version 5",
165      "kdb5_util load_dump version 4\n",
166      0,
167      0,
168      dump_k5beta7_princ,
169      dump_k5beta7_policy,
170      process_k5beta7_record
171 };
172 dump_version iprop_version = {
173      "Kerberos iprop version",
174      "iprop",
175      0,
176      0,
177      dump_iprop_princ,
178      dump_k5beta7_policy,
179      process_k5beta7_record
180 };
181 dump_version ov_version = {
182      "OpenV*Secure V1.0",
183      "OpenV*Secure V1.0\t",
184      1,
185      1,
186      dump_ov_princ,
187      dump_k5beta7_policy,
188      process_ov_record
189 };
190 
191 dump_version r1_3_version = {
192      "Kerberos version 5 release 1.3",
193      "kdb5_util load_dump version 5\n",
194      0,
195      0,
196      dump_k5beta7_princ_withpolicy,
197      dump_k5beta7_policy,
198      process_k5beta7_record,
199 };
200 
201 /* External data */
202 extern char		*current_dbname;
203 extern krb5_boolean	dbactive;
204 extern int		exit_status;
205 extern krb5_context	util_context;
206 extern kadm5_config_params global_params;
207 
208 /* Strings */
209 
210 #define k5beta_dump_header	"kdb5_edit load_dump version 2.0\n"
211 
212 static const char null_mprinc_name[] = "kdb5_dump@MISSING";
213 
214 /*
215  * We define gettext(s) to be s here, so that xgettext will extract the
216  * strings to the .po file. At the end of the message section we will
217  * undef gettext so that we can use it as a funtion.
218  */
219 
220 #define	gettext(s) s
221 
222 /* Message strings */
223 static const char regex_err[] =
224 	gettext("%s: regular expression error - %s\n");
225 static const char regex_merr[] =
226 	gettext("%s: regular expression match error - %s\n");
227 static const char pname_unp_err[] =
228 	gettext("%s: cannot unparse principal name (%s)\n");
229 static const char mname_unp_err[] =
230 	gettext("%s: cannot unparse modifier name (%s)\n");
231 static const char nokeys_err[] =
232 	gettext("%s: cannot find any standard key for %s\n");
233 static const char sdump_tl_inc_err[] =
234 	gettext("%s: tagged data list inconsistency for %s "
235 		"(counted %d, stored %d)\n");
236 static const char stand_fmt_name[] =
237 	gettext("Kerberos version 5");
238 static const char old_fmt_name[] =
239 	gettext("Kerberos version 5 old format");
240 static const char b6_fmt_name[] =
241 	gettext("Kerberos version 5 beta 6 format");
242 static const char ofopen_error[] =
243 	gettext("%s: cannot open %s for writing (%s)\n");
244 static const char oflock_error[] =
245 	gettext("%s: cannot lock %s (%s)\n");
246 static const char dumprec_err[] =
247 	gettext("%s: error performing %s dump (%s)\n");
248 static const char dumphdr_err[] =
249 	gettext("%s: error dumping %s header (%s)\n");
250 static const char trash_end_fmt[] =
251 	gettext("%s(%d): ignoring trash at end of line: ");
252 static const char read_name_string[] =
253 	gettext("name string");
254 static const char read_key_type[] =
255 	gettext("key type");
256 static const char read_key_data[] =
257 	gettext("key data");
258 static const char read_pr_data1[] =
259 	gettext("first set of principal attributes");
260 static const char read_mod_name[] =
261 	gettext("modifier name");
262 static const char read_pr_data2[] =
263 	gettext("second set of principal attributes");
264 static const char read_salt_data[] =
265 	gettext("salt data");
266 static const char read_akey_type[] =
267 	gettext("alternate key type");
268 static const char read_akey_data[] =
269 	gettext("alternate key data");
270 static const char read_asalt_type[] =
271 	gettext("alternate salt type");
272 static const char read_asalt_data[] =
273 	gettext("alternate salt data");
274 static const char read_exp_data[] =
275 	gettext("expansion data");
276 static const char store_err_fmt[] =
277 	gettext("%s(%d): cannot store %s(%s)\n");
278 static const char add_princ_fmt[] =
279 	gettext("%s\n");
280 static const char parse_err_fmt[] =
281 	gettext("%s(%d): cannot parse %s (%s)\n");
282 static const char read_err_fmt[] =
283 	gettext("%s(%d): cannot read %s\n");
284 static const char no_mem_fmt[] =
285 	gettext("%s(%d): no memory for buffers\n");
286 static const char rhead_err_fmt[] =
287 	gettext("%s(%d): cannot match size tokens\n");
288 static const char err_line_fmt[] =
289 	gettext("%s: error processing line %d of %s\n");
290 static const char head_bad_fmt[] =
291 	gettext("%s: dump header bad in %s\n");
292 static const char read_bytecnt[] =
293 	gettext("record byte count");
294 static const char read_encdata[] =
295 	gettext("encoded data");
296 static const char n_name_unp_fmt[] =
297 	gettext("%s(%s): cannot unparse name\n");
298 static const char n_dec_cont_fmt[] =
299 	gettext("%s(%s): cannot decode contents\n");
300 static const char read_nint_data[] =
301 	gettext("principal static attributes");
302 static const char read_tcontents[] =
303 	gettext("tagged data contents");
304 static const char read_ttypelen[] =
305 	gettext("tagged data type and length");
306 static const char read_kcontents[] =
307 	gettext("key data contents");
308 static const char read_ktypelen[] =
309 	gettext("key data type and length");
310 static const char read_econtents[] =
311 	gettext("extra data contents");
312 static const char k5beta_fmt_name[] =
313 	gettext("Kerberos version 5 old format");
314 static const char standard_fmt_name[] =
315 	gettext("Kerberos version 5 format");
316 static const char no_name_mem_fmt[] =
317 	gettext("%s: cannot get memory for temporary name\n");
318 static const char ctx_err_fmt[] =
319 	gettext("%s: cannot initialize Kerberos context\n");
320 static const char stdin_name[] =
321 	gettext("standard input");
322 static const char remaster_err_fmt[] =
323 	gettext("while re-encoding keys for principal %s with new master key");
324 static const char restfail_fmt[] =
325 	gettext("%s: %s restore failed\n");
326 static const char close_err_fmt[] =
327 	gettext("%s: cannot close database (%s)\n");
328 static const char dbinit_err_fmt[] =
329 	gettext("%s: cannot initialize database (%s)\n");
330 static const char dblock_err_fmt[] =
331 	gettext("%s: cannot initialize database lock (%s)\n");
332 static const char dbname_err_fmt[] =
333 	gettext("%s: cannot set database name to %s (%s)\n");
334 static const char dbdelerr_fmt[] =
335 	gettext("%s: cannot delete bad database %s (%s)\n");
336 static const char dbunlockerr_fmt[] =
337 	gettext("%s: cannot unlock database %s (%s)\n");
338 static const char dbrenerr_fmt[] =
339 	gettext("%s: cannot rename database %s to %s (%s)\n");
340 static const char dbcreaterr_fmt[] =
341 	gettext("%s: cannot create database %s (%s)\n");
342 static const char dfile_err_fmt[] =
343 	gettext("%s: cannot open %s (%s)\n");
344 
345 /*
346  * We now return you to your regularly scheduled program.
347  */
348 #undef gettext
349 
350 static const char oldoption[] = "-old";
351 static const char b6option[] = "-b6";
352 static const char b7option[] = "-b7";
353 static const char ipropoption[] = "-i";
354 static const char verboseoption[] = "-verbose";
355 static const char updateoption[] = "-update";
356 static const char hashoption[] = "-hash";
357 static const char ovoption[] = "-ov";
358 static const char dump_tmptrail[] = "~";
359 
360 /*
361  * Re-encrypt the key_data with the new master key...
362  */
363 static krb5_error_code master_key_convert(context, db_entry)
364     krb5_context	  context;
365     krb5_db_entry	* db_entry;
366 {
367     krb5_error_code	retval;
368     krb5_keyblock 	v5plainkey, *key_ptr;
369     krb5_keysalt 	keysalt;
370     int	      i, j;
371     krb5_key_data	new_key_data, *key_data;
372     krb5_boolean	is_mkey;
373 
374     is_mkey = krb5_principal_compare(context, master_princ, db_entry->princ);
375 
376     if (is_mkey && db_entry->n_key_data != 1)
377 	    fprintf(stderr,
378 		    gettext(
379 		      "Master key db entry has %d keys, expecting only 1!\n"),
380 		    db_entry->n_key_data);
381     for (i=0; i < db_entry->n_key_data; i++) {
382 	key_data = &db_entry->key_data[i];
383 	if (key_data->key_data_length == 0)
384 	    continue;
385 	retval = krb5_dbekd_decrypt_key_data(context, &master_key,
386 					     key_data, &v5plainkey,
387 					     &keysalt);
388 	if (retval)
389 		return retval;
390 
391 	memset(&new_key_data, 0, sizeof(new_key_data));
392 	key_ptr = is_mkey ? &new_master_key : &v5plainkey;
393 	retval = krb5_dbekd_encrypt_key_data(context, &new_master_key,
394 					     key_ptr, &keysalt,
395 					     key_data->key_data_kvno,
396 					     &new_key_data);
397 	if (retval)
398 		return retval;
399 	krb5_free_keyblock_contents(context, &v5plainkey);
400 	for (j = 0; j < key_data->key_data_ver; j++) {
401 	    if (key_data->key_data_length[j]) {
402 		free(key_data->key_data_contents[j]);
403 	    }
404 	}
405 	*key_data = new_key_data;
406     }
407     return 0;
408 }
409 
410 /*
411  * Update the "ok" file.
412  */
413 void update_ok_file (file_name)
414      char *file_name;
415 {
416 	/* handle slave locking/failure stuff */
417 	char *file_ok;
418 	int fd;
419 	static char ok[]=".dump_ok";
420 
421 	if ((file_ok = (char *)malloc(strlen(file_name) + strlen(ok) + 1))
422 	    == NULL) {
423 		com_err(progname, ENOMEM,
424 		    gettext("while allocating filename "
425 			"for update_ok_file"));
426 		exit_status++;
427 		return;
428 	}
429 	strcpy(file_ok, file_name);
430 	strcat(file_ok, ok);
431 	if ((fd = open(file_ok, O_WRONLY|O_CREAT|O_TRUNC, 0600)) < 0) {
432 		com_err(progname, errno,
433 		    gettext("while creating 'ok' file, '%s'"),
434 			file_ok);
435 		exit_status++;
436 		free(file_ok);
437 		return;
438 	}
439 	if (write(fd, "", 1) != 1) {
440 		com_err(progname, errno,
441 		    gettext("while writing to 'ok' file, '%s'"),
442 		    file_ok);
443 	     exit_status++;
444 	     free(file_ok);
445 	     return;
446 	}
447 
448 	free(file_ok);
449 	close(fd);
450 	return;
451 }
452 
453 /*
454  * name_matches()	- See if a principal name matches a regular expression
455  *			  or string.
456  */
457 static int
458 name_matches(name, arglist)
459     char		*name;
460     struct dump_args	*arglist;
461 {
462 #if	HAVE_REGCOMP
463     regex_t	match_exp;
464     regmatch_t	match_match;
465     int		match_error;
466     char	match_errmsg[BUFSIZ];
467     size_t	errmsg_size;
468 #elif	HAVE_REGEXP_H
469     char	regexp_buffer[RE_BUF_SIZE];
470 #elif	HAVE_RE_COMP
471     extern char	*re_comp();
472     char	*re_result;
473 #endif	/* HAVE_RE_COMP */
474     int		i, match;
475 
476     /*
477      * Plow, brute force, through the list of names/regular expressions.
478      */
479     match = (arglist->nnames) ? 0 : 1;
480     for (i=0; i<arglist->nnames; i++) {
481 #if	HAVE_REGCOMP
482 	/*
483 	 * Compile the regular expression.
484 	 */
485 	match_error = regcomp(&match_exp, arglist->names[i], REG_EXTENDED);
486 	if (match_error) {
487 	    errmsg_size = regerror(match_error,
488 				   &match_exp,
489 				   match_errmsg,
490 				   sizeof(match_errmsg));
491 			fprintf(stderr, gettext(regex_err),
492 			    arglist->programname, match_errmsg);
493 	    break;
494 	}
495 	/*
496 	 * See if we have a match.
497 	 */
498 	match_error = regexec(&match_exp, name, 1, &match_match, 0);
499 	if (match_error) {
500 	    if (match_error != REG_NOMATCH) {
501 		errmsg_size = regerror(match_error,
502 				       &match_exp,
503 				       match_errmsg,
504 				       sizeof(match_errmsg));
505 				fprintf(stderr, gettext(regex_merr),
506 			arglist->programname, match_errmsg);
507 		break;
508 	    }
509 	}
510 	else {
511 	    /*
512 	     * We have a match.  See if it matches the whole
513 	     * name.
514 	     */
515 	    if ((match_match.rm_so == 0) &&
516 		(match_match.rm_eo == strlen(name)))
517 		match = 1;
518 	}
519 	regfree(&match_exp);
520 #elif	HAVE_REGEXP_H
521 	/*
522 	 * Compile the regular expression.
523 	 */
524 	compile(arglist->names[i],
525 		regexp_buffer,
526 		&regexp_buffer[RE_BUF_SIZE],
527 		'\0');
528 	if (step(name, regexp_buffer)) {
529 	    if ((loc1 == name) &&
530 		(loc2 == &name[strlen(name)]))
531 		match = 1;
532 	}
533 #elif	HAVE_RE_COMP
534 	/*
535 	 * Compile the regular expression.
536 	 */
537 	if (re_result = re_comp(arglist->names[i])) {
538 	    fprintf(stderr, gettext(regex_err), arglist->programname, re_result);
539 	    break;
540 	}
541 	if (re_exec(name))
542 	    match = 1;
543 #else	/* HAVE_RE_COMP */
544 	/*
545 	 * If no regular expression support, then just compare the strings.
546 	 */
547 	if (!strcmp(arglist->names[i], name))
548 	    match = 1;
549 #endif	/* HAVE_REGCOMP */
550 	if (match)
551 	    break;
552     }
553     return(match);
554 }
555 
556 static krb5_error_code
557 find_enctype(dbentp, enctype, salttype, kentp)
558     krb5_db_entry	*dbentp;
559     krb5_enctype	enctype;
560     krb5_int32		salttype;
561     krb5_key_data	**kentp;
562 {
563     int			i;
564     int			maxkvno;
565     krb5_key_data	*datap;
566 
567     maxkvno = -1;
568     datap = (krb5_key_data *) NULL;
569     for (i=0; i<dbentp->n_key_data; i++) {
570 	if (( (krb5_enctype)dbentp->key_data[i].key_data_type[0] == enctype) &&
571 	    ((dbentp->key_data[i].key_data_type[1] == salttype) ||
572 	     (salttype < 0))) {
573 	    maxkvno = dbentp->key_data[i].key_data_kvno;
574 	    datap = &dbentp->key_data[i];
575 	}
576     }
577     if (maxkvno >= 0) {
578 	*kentp = datap;
579 	return(0);
580     }
581     return(ENOENT);
582 }
583 
584 #if 0
585 /*
586  * dump_k5beta_header()	- Make a dump header that is recognizable by Kerberos
587  *			  Version 5 Beta 5 and previous releases.
588  */
589 static krb5_error_code
590 dump_k5beta_header(arglist)
591     struct dump_args *arglist;
592 {
593     /* The old header consists of the leading string */
594     fprintf(arglist->ofile, k5beta_dump_header);
595     return(0);
596 }
597 #endif
598 
599 /*
600  * dump_k5beta_iterator()	- Dump an entry in a format that is usable
601  *				  by Kerberos Version 5 Beta 5 and previous
602  *				  releases.
603  */
604 static krb5_error_code
605 dump_k5beta_iterator(ptr, entry)
606     krb5_pointer	ptr;
607     krb5_db_entry	*entry;
608 {
609     krb5_error_code	retval;
610     struct dump_args	*arg;
611     char		*name, *mod_name;
612     krb5_principal	mod_princ;
613     krb5_key_data	*pkey, *akey, nullkey;
614     krb5_timestamp	mod_date, last_pwd_change;
615     int			i;
616 
617     /* Initialize */
618     arg = (struct dump_args *) ptr;
619     name = (char *) NULL;
620     mod_name = (char *) NULL;
621     memset(&nullkey, 0, sizeof(nullkey));
622 
623     /*
624      * Flatten the principal name.
625      */
626     if ((retval = krb5_unparse_name(arg->kcontext,
627 				    entry->princ,
628 				    &name))) {
629 		fprintf(stderr, gettext(pname_unp_err),
630 		arg->programname, error_message(retval));
631 	return(retval);
632     }
633 
634     /*
635      * Re-encode the keys in the new master key, if necessary.
636      */
637     if (mkey_convert) {
638 	retval = master_key_convert(arg->kcontext, entry);
639 	if (retval) {
640 	    com_err(arg->programname, retval, remaster_err_fmt, name);
641 	    return retval;
642 	}
643     }
644 
645     /*
646      * If we don't have any match strings, or if our name matches, then
647      * proceed with the dump, otherwise, just forget about it.
648      */
649     if (!arg->nnames || name_matches(name, arg)) {
650 	/*
651 	 * Deserialize the modifier record.
652 	 */
653 	mod_name = (char *) NULL;
654 	mod_princ = NULL;
655 	last_pwd_change = mod_date = 0;
656 	pkey = akey = (krb5_key_data *) NULL;
657 	if (!(retval = krb5_dbe_lookup_mod_princ_data(arg->kcontext,
658 						      entry,
659 						      &mod_date,
660 						      &mod_princ))) {
661 	    if (mod_princ) {
662 		/*
663 		 * Flatten the modifier name.
664 		 */
665 		if ((retval = krb5_unparse_name(arg->kcontext,
666 						mod_princ,
667 						&mod_name)))
668 					fprintf(stderr, gettext(mname_unp_err),
669 					    arg->programname,
670 			    error_message(retval));
671 		krb5_free_principal(arg->kcontext, mod_princ);
672 	    }
673 	}
674 	if (!mod_name)
675 	    mod_name = strdup(null_mprinc_name);
676 
677 	/*
678 	 * Find the last password change record and set it straight.
679 	 */
680 	if ((retval =
681 	     krb5_dbe_lookup_last_pwd_change(arg->kcontext, entry,
682 					     &last_pwd_change))) {
683 			fprintf(stderr, gettext(nokeys_err),
684 			    arg->programname, name);
685 	    krb5_xfree(mod_name);
686 	    krb5_xfree(name);
687 	    return(retval);
688 	}
689 
690 	/*
691 	 * Find the 'primary' key and the 'alternate' key.
692 	 */
693 	if ((retval = find_enctype(entry,
694 				   ENCTYPE_DES_CBC_CRC,
695 				   KRB5_KDB_SALTTYPE_NORMAL,
696 				   &pkey)) &&
697 	    (retval = find_enctype(entry,
698 				   ENCTYPE_DES_CBC_CRC,
699 				   KRB5_KDB_SALTTYPE_V4,
700 				   &akey))) {
701 			fprintf(stderr, gettext(nokeys_err),
702 			    arg->programname, name);
703 	    krb5_xfree(mod_name);
704 	    krb5_xfree(name);
705 	    return(retval);
706 	}
707 
708 	/* If we only have one type, then ship it out as the primary. */
709 	if (!pkey && akey) {
710 	    pkey = akey;
711 	    akey = &nullkey;
712 	}
713 	else {
714 	    if (!akey)
715 		akey = &nullkey;
716 	}
717 
718 	/*
719 	 * First put out strings representing the length of the variable
720 	 * length data in this record, then the name and the primary key type.
721 	 */
722 	fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%d\t%s\t%d\t", strlen(name),
723 		strlen(mod_name),
724 		(krb5_int32) pkey->key_data_length[0],
725 		(krb5_int32) akey->key_data_length[0],
726 		(krb5_int32) pkey->key_data_length[1],
727 		(krb5_int32) akey->key_data_length[1],
728 		name,
729 		(krb5_int32) pkey->key_data_type[0]);
730 	for (i=0; i<pkey->key_data_length[0]; i++) {
731 	    fprintf(arg->ofile, "%02x", pkey->key_data_contents[0][i]);
732 	}
733 	/*
734 	 * Second, print out strings representing the standard integer
735 	 * data in this record.
736 	 */
737 	fprintf(arg->ofile,
738 		"\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%s\t%u\t%u\t%u\t",
739 		(krb5_int32) pkey->key_data_kvno,
740 		entry->max_life, entry->max_renewable_life,
741 		1 /* Fake mkvno */, entry->expiration, entry->pw_expiration,
742 		last_pwd_change, entry->last_success, entry->last_failed,
743 		entry->fail_auth_count, mod_name, mod_date,
744 		entry->attributes, pkey->key_data_type[1]);
745 
746 	/* Pound out the salt data, if present. */
747 	for (i=0; i<pkey->key_data_length[1]; i++) {
748 	    fprintf(arg->ofile, "%02x", pkey->key_data_contents[1][i]);
749 	}
750 	/* Pound out the alternate key type and contents */
751 	fprintf(arg->ofile, "\t%u\t", akey->key_data_type[0]);
752 	for (i=0; i<akey->key_data_length[0]; i++) {
753 	    fprintf(arg->ofile, "%02x", akey->key_data_contents[0][i]);
754 	}
755 	/* Pound out the alternate salt type and contents */
756 	fprintf(arg->ofile, "\t%u\t", akey->key_data_type[1]);
757 	for (i=0; i<akey->key_data_length[1]; i++) {
758 	    fprintf(arg->ofile, "%02x", akey->key_data_contents[1][i]);
759 	}
760 	/* Pound out the expansion data. (is null) */
761 	for (i=0; i < 8; i++) {
762 	    fprintf(arg->ofile, "\t%u", 0);
763 	}
764 	fprintf(arg->ofile, ";\n");
765 	/* If we're blabbing, do it */
766 	if (arg->verbose)
767 	    fprintf(stderr, "%s\n", name);
768 	krb5_xfree(mod_name);
769     }
770     krb5_xfree(name);
771     return(0);
772 }
773 
774 /*
775  * dump_k5beta6_iterator()	- Output a dump record in krb5b6 format.
776  */
777 static krb5_error_code
778 dump_k5beta6_iterator(ptr, entry)
779     krb5_pointer	ptr;
780     krb5_db_entry	*entry;
781 {
782     return dump_k5beta6_iterator_ext(ptr, entry, 0);
783 }
784 
785 static krb5_error_code
786 dump_k5beta6_iterator_ext(ptr, entry, kadm)
787     krb5_pointer	ptr;
788     krb5_db_entry	*entry;
789     int			kadm;
790 {
791     krb5_error_code	retval;
792     struct dump_args	*arg;
793     char		*name;
794     krb5_tl_data	*tlp;
795     krb5_key_data	*kdata;
796     int			counter, skip, i, j;
797 
798     /* Initialize */
799     arg = (struct dump_args *) ptr;
800     name = (char *) NULL;
801 
802     /*
803      * Flatten the principal name.
804      */
805     if ((retval = krb5_unparse_name(arg->kcontext,
806 				    entry->princ,
807 				    &name))) {
808 		fprintf(stderr, gettext(pname_unp_err),
809 		arg->programname, error_message(retval));
810 	return(retval);
811     }
812 
813     /*
814      * Re-encode the keys in the new master key, if necessary.
815      */
816     if (mkey_convert) {
817 	retval = master_key_convert(arg->kcontext, entry);
818 	if (retval) {
819 	    com_err(arg->programname, retval, remaster_err_fmt, name);
820 	    return retval;
821 	}
822     }
823 
824     /*
825      * If we don't have any match strings, or if our name matches, then
826      * proceed with the dump, otherwise, just forget about it.
827      */
828     if (!arg->nnames || name_matches(name, arg)) {
829 	/*
830 	 * We'd like to just blast out the contents as they would appear in
831 	 * the database so that we can just suck it back in, but it doesn't
832 	 * lend itself to easy editing.
833 	 */
834 
835 	/*
836 	 * The dump format is as follows:
837 	 *	len strlen(name) n_tl_data n_key_data e_length
838 	 *	name
839 	 *	attributes max_life max_renewable_life expiration
840 	 *	pw_expiration last_success last_failed fail_auth_count
841 	 *	n_tl_data*[type length <contents>]
842 	 *	n_key_data*[ver kvno ver*(type length <contents>)]
843 	 *	<e_data>
844 	 * Fields which are not encapsulated by angle-brackets are to appear
845 	 * verbatim.  A bracketed field's absence is indicated by a -1 in its
846 	 * place
847 	 */
848 
849 	/*
850 	 * Make sure that the tagged list is reasonably correct.
851 	 */
852 	counter = skip = 0;
853 	for (tlp = entry->tl_data; tlp; tlp = tlp->tl_data_next) {
854 	     /*
855 	      * don't dump tl data types we know aren't understood by
856 	      * earlier revisions [krb5-admin/89]
857 	      */
858 	     switch (tlp->tl_data_type) {
859 	     case KRB5_TL_KADM_DATA:
860 		  if (kadm)
861 		      counter++;
862 		  else
863 		      skip++;
864 		  break;
865 	     default:
866 		  counter++;
867 		  break;
868 	     }
869 	}
870 
871 	if (counter + skip == entry->n_tl_data) {
872 	    /* Pound out header */
873 	    fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%s\t",
874 		    (int) entry->len,
875 		    strlen(name),
876 		    counter,
877 		    (int) entry->n_key_data,
878 		    (int) entry->e_length,
879 		    name);
880 	    fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%d\t%d\t%d\t",
881 		    entry->attributes,
882 		    entry->max_life,
883 		    entry->max_renewable_life,
884 		    entry->expiration,
885 		    entry->pw_expiration,
886 		    entry->last_success,
887 		    entry->last_failed,
888 		    entry->fail_auth_count);
889 	    /* Pound out tagged data. */
890 	    for (tlp = entry->tl_data; tlp; tlp = tlp->tl_data_next) {
891 		if (tlp->tl_data_type == KRB5_TL_KADM_DATA && !kadm)
892 		     continue; /* see above, [krb5-admin/89] */
893 
894 		fprintf(arg->ofile, "%d\t%d\t",
895 			(int) tlp->tl_data_type,
896 			(int) tlp->tl_data_length);
897 		if (tlp->tl_data_length)
898 		    for (i=0; i<tlp->tl_data_length; i++)
899 			fprintf(arg->ofile, "%02x", tlp->tl_data_contents[i]);
900 		else
901 		    fprintf(arg->ofile, "%d", -1);
902 		fprintf(arg->ofile, "\t");
903 	    }
904 
905 	    /* Pound out key data */
906 	    for (counter=0; counter<entry->n_key_data; counter++) {
907 		kdata = &entry->key_data[counter];
908 		fprintf(arg->ofile, "%d\t%d\t",
909 			(int) kdata->key_data_ver,
910 			(int) kdata->key_data_kvno);
911 		for (i=0; i<kdata->key_data_ver; i++) {
912 		    fprintf(arg->ofile, "%d\t%d\t",
913 			    kdata->key_data_type[i],
914 			    kdata->key_data_length[i]);
915 		    if (kdata->key_data_length[i])
916 			for (j=0; j<kdata->key_data_length[i]; j++)
917 			    fprintf(arg->ofile, "%02x",
918 				    kdata->key_data_contents[i][j]);
919 		    else
920 			fprintf(arg->ofile, "%d", -1);
921 		    fprintf(arg->ofile, "\t");
922 		}
923 	    }
924 
925 	    /* Pound out extra data */
926 	    if (entry->e_length)
927 		for (i=0; i<entry->e_length; i++)
928 		    fprintf(arg->ofile, "%02x", entry->e_data[i]);
929 	    else
930 		fprintf(arg->ofile, "%d", -1);
931 
932 	    /* Print trailer */
933 	    fprintf(arg->ofile, ";\n");
934 
935 	    if (arg->verbose)
936 		fprintf(stderr, "%s\n", name);
937 	}
938 	else {
939 			fprintf(stderr, gettext(sdump_tl_inc_err),
940 		    arg->programname, name, counter+skip,
941 		    (int) entry->n_tl_data);
942 	    retval = EINVAL;
943 	}
944     }
945     krb5_xfree(name);
946     return(retval);
947 }
948 
949 /*
950  * dump_iprop_iterator()	- Output a dump record in iprop format.
951  */
952 static krb5_error_code
953 dump_iprop_iterator(ptr, entry)
954     krb5_pointer	ptr;
955     krb5_db_entry	*entry;
956 {
957     krb5_error_code	retval;
958     struct dump_args	*arg;
959     char		*name;
960     krb5_tl_data	*tlp;
961     krb5_key_data	*kdata;
962     int			counter, i, j;
963 
964     /* Initialize */
965     arg = (struct dump_args *) ptr;
966     name = (char *) NULL;
967 
968     /*
969      * Flatten the principal name.
970      */
971     if ((retval = krb5_unparse_name(arg->kcontext,
972 				    entry->princ,
973 				    &name))) {
974 		fprintf(stderr, gettext(pname_unp_err),
975 		arg->programname, error_message(retval));
976 	return(retval);
977     }
978 
979     /*
980      * Re-encode the keys in the new master key, if necessary.
981      */
982     if (mkey_convert) {
983 	retval = master_key_convert(arg->kcontext, entry);
984 	if (retval) {
985 	    com_err(arg->programname, retval, remaster_err_fmt, name);
986 	    return retval;
987 	}
988     }
989 
990     /*
991      * If we don't have any match strings, or if our name matches, then
992      * proceed with the dump, otherwise, just forget about it.
993      */
994     if (!arg->nnames || name_matches(name, arg)) {
995 	/*
996 	 * We'd like to just blast out the contents as they would
997 	 * appear in the database so that we can just suck it back
998 	 * in, but it doesn't lend itself to easy editing.
999 	 */
1000 
1001 	/*
1002 	 * The dump format is as follows: len strlen(name)
1003 	 * n_tl_data n_key_data e_length name attributes max_life
1004 	 * max_renewable_life expiration pw_expiration last_success
1005 	 * last_failed fail_auth_count n_tl_data*[type length
1006 	 * <contents>] n_key_data*[ver kvno ver*(type length
1007 	 * <contents>)] <e_data> Fields which are not encapsulated
1008 	 * by angle-brackets are to appear verbatim.  Bracketed
1009 	 * fields absence is indicated by a -1 in its place
1010 	 */
1011 
1012 	/*
1013 	 * Make sure that the tagged list is reasonably correct.
1014 	 */
1015 	counter = 0;
1016 	for (tlp = entry->tl_data; tlp; tlp = tlp->tl_data_next)
1017 		  counter++;
1018 
1019 	if (counter == entry->n_tl_data) {
1020 	    /* Pound out header */
1021 	    fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%s\t",
1022 		    (int) entry->len,
1023 		    strlen(name),
1024 		    (int) entry->n_tl_data,
1025 		    (int) entry->n_key_data,
1026 		    (int) entry->e_length,
1027 		    name);
1028 	    fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%d\t%d\t%d\t",
1029 		    entry->attributes,
1030 		    entry->max_life,
1031 		    entry->max_renewable_life,
1032 		    entry->expiration,
1033 		    entry->pw_expiration,
1034 		    entry->last_success,
1035 		    entry->last_failed,
1036 		    entry->fail_auth_count);
1037 	    /* Pound out tagged data. */
1038 			for (tlp = entry->tl_data; tlp;
1039 			    tlp = tlp->tl_data_next) {
1040 		fprintf(arg->ofile, "%d\t%d\t",
1041 			(int) tlp->tl_data_type,
1042 			(int) tlp->tl_data_length);
1043 		if (tlp->tl_data_length)
1044 					for (i = 0;
1045 					    i < tlp->tl_data_length;
1046 					    i++)
1047 						fprintf(arg->ofile, "%02x",
1048 							tlp->
1049 							tl_data_contents[i]);
1050 		else
1051 		    fprintf(arg->ofile, "%d", -1);
1052 		fprintf(arg->ofile, "\t");
1053 	    }
1054 
1055 	    /* Pound out key data */
1056 			for (counter = 0;
1057 			    counter < entry->n_key_data; counter++) {
1058 		kdata = &entry->key_data[counter];
1059 		fprintf(arg->ofile, "%d\t%d\t",
1060 			(int) kdata->key_data_ver,
1061 			(int) kdata->key_data_kvno);
1062 		for (i=0; i<kdata->key_data_ver; i++) {
1063 		    fprintf(arg->ofile, "%d\t%d\t",
1064 			    kdata->key_data_type[i],
1065 			    kdata->key_data_length[i]);
1066 		    if (kdata->key_data_length[i])
1067 						for (j = 0;
1068 						    j < kdata->
1069 							key_data_length[i];
1070 						    j++)
1071 							fprintf(arg->ofile,
1072 							    "%02x",
1073 							    kdata->
1074 							    key_data_contents
1075 								[i][j]);
1076 		    else
1077 			fprintf(arg->ofile, "%d", -1);
1078 		    fprintf(arg->ofile, "\t");
1079 		}
1080 	    }
1081 
1082 	    /* Pound out extra data */
1083 	    if (entry->e_length)
1084 		for (i=0; i<entry->e_length; i++)
1085 					fprintf(arg->ofile, "%02x",
1086 						entry->e_data[i]);
1087 	    else
1088 		fprintf(arg->ofile, "%d", -1);
1089 
1090 	    /* Print trailer */
1091 	    fprintf(arg->ofile, ";\n");
1092 
1093 	    if (arg->verbose)
1094 		fprintf(stderr, "%s\n", name);
1095 		} else {
1096 			fprintf(stderr, gettext(sdump_tl_inc_err),
1097 		    arg->programname, name, counter,
1098 		    (int) entry->n_tl_data);
1099 	    retval = EINVAL;
1100 	}
1101     }
1102     krb5_xfree(name);
1103     return(retval);
1104 }
1105 
1106 /*
1107  * dump_k5beta7_iterator()	- Output a dump record in krb5b7 format.
1108  */
1109 static krb5_error_code
1110 dump_k5beta7_princ(ptr, entry)
1111     krb5_pointer	ptr;
1112     krb5_db_entry	*entry;
1113 {
1114     return dump_k5beta7_princ_ext(ptr, entry, 0);
1115 }
1116 
1117 static krb5_error_code
1118 dump_k5beta7_princ_ext(ptr, entry, kadm)
1119     krb5_pointer	ptr;
1120     krb5_db_entry	*entry;
1121     int			kadm;
1122 {
1123      krb5_error_code retval;
1124      struct dump_args *arg;
1125      char *name;
1126      int tmp_nnames;
1127 
1128      /* Initialize */
1129      arg = (struct dump_args *) ptr;
1130      name = (char *) NULL;
1131 
1132      /*
1133       * Flatten the principal name.
1134       */
1135      if ((retval = krb5_unparse_name(arg->kcontext,
1136 				     entry->princ,
1137 				     &name))) {
1138 		fprintf(stderr, gettext(pname_unp_err),
1139 		  arg->programname, error_message(retval));
1140 	  return(retval);
1141      }
1142      /*
1143       * If we don't have any match strings, or if our name matches, then
1144       * proceed with the dump, otherwise, just forget about it.
1145       */
1146      if (!arg->nnames || name_matches(name, arg)) {
1147 	  fprintf(arg->ofile, "princ\t");
1148 
1149 	  /* save the callee from matching the name again */
1150 	  tmp_nnames = arg->nnames;
1151 	  arg->nnames = 0;
1152 	  retval = dump_k5beta6_iterator_ext(ptr, entry, kadm);
1153 	  arg->nnames = tmp_nnames;
1154      }
1155 
1156      free(name);
1157      return retval;
1158 }
1159 
1160 /*
1161  * dump_iprop_princ()	- Output a dump record in iprop format.
1162  * This was created in order to dump more data, such as kadm5 tl
1163  */
1164 static krb5_error_code
1165 dump_iprop_princ(ptr, entry)
1166     krb5_pointer	ptr;
1167     krb5_db_entry	*entry;
1168 {
1169      krb5_error_code retval;
1170      struct dump_args *arg;
1171      char *name;
1172      int tmp_nnames;
1173 
1174      /* Initialize */
1175      arg = (struct dump_args *) ptr;
1176      name = (char *) NULL;
1177 
1178      /*
1179       * Flatten the principal name.
1180       */
1181      if ((retval = krb5_unparse_name(arg->kcontext,
1182 				     entry->princ,
1183 				     &name))) {
1184 		fprintf(stderr, gettext(pname_unp_err),
1185 		  arg->programname, error_message(retval));
1186 	  return(retval);
1187      }
1188      /*
1189       * If we don't have any match strings, or if our name matches, then
1190       * proceed with the dump, otherwise, just forget about it.
1191       */
1192      if (!arg->nnames || name_matches(name, arg)) {
1193 	  fprintf(arg->ofile, "princ\t");
1194 
1195 	  /* save the callee from matching the name again */
1196 	  tmp_nnames = arg->nnames;
1197 	  arg->nnames = 0;
1198 	  retval = dump_iprop_iterator(ptr, entry);
1199 	  arg->nnames = tmp_nnames;
1200      }
1201      free(name);
1202 	return (retval);
1203 }
1204 
1205 static krb5_error_code
1206 dump_k5beta7_princ_withpolicy(ptr, entry)
1207     krb5_pointer	ptr;
1208     krb5_db_entry	*entry;
1209 {
1210     return dump_k5beta7_princ_ext(ptr, entry, 1);
1211 }
1212 
1213 void dump_k5beta7_policy(void *data, osa_policy_ent_t entry)
1214 {
1215      struct dump_args *arg;
1216 
1217      arg = (struct dump_args *) data;
1218      fprintf(arg->ofile, "policy\t%s\t%d\t%d\t%d\t%d\t%d\t%d\n", entry->name,
1219 	     entry->pw_min_life, entry->pw_max_life, entry->pw_min_length,
1220 	     entry->pw_min_classes, entry->pw_history_num,
1221 	     entry->policy_refcnt);
1222 }
1223 
1224 static void print_key_data(FILE *f, krb5_key_data *key_data)
1225 {
1226      int c;
1227 
1228      fprintf(f, "%d\t%d\t", key_data->key_data_type[0],
1229 	     key_data->key_data_length[0]);
1230      for(c = 0; c < key_data->key_data_length[0]; c++)
1231 	  fprintf(f, "%02x ",
1232 		  key_data->key_data_contents[0][c]);
1233 }
1234 
1235 /*
1236  * Function: print_princ
1237  *
1238  * Purpose: output osa_adb_princ_ent data in a human
1239  *	    readable format (which is a format suitable for
1240  *	    ovsec_adm_import consumption)
1241  *
1242  * Arguments:
1243  *	data		(input) pointer to a structure containing a FILE *
1244  *			        and a record counter.
1245  *	entry		(input) entry to get dumped.
1246  * 	<return value>	void
1247  *
1248  * Requires:
1249  *	nuttin
1250  *
1251  * Effects:
1252  *	writes data to the specified file pointerp.
1253  *
1254  * Modifies:
1255  *	nuttin
1256  *
1257  */
1258 static krb5_error_code dump_ov_princ(krb5_pointer ptr, krb5_db_entry *kdb)
1259 {
1260     char *princstr;
1261     int	x, y, foundcrc;
1262     struct dump_args *arg;
1263     krb5_tl_data tl_data;
1264     osa_princ_ent_rec adb;
1265     XDR xdrs;
1266 
1267     arg = (struct dump_args *) ptr;
1268     /*
1269      * XXX Currently, lookup_tl_data always returns zero; it sets
1270      * tl_data->tl_data_length to zero if the type isn't found.
1271      * This should be fixed...
1272      */
1273     /*
1274      * XXX Should this function do nothing for a principal with no
1275      * admin data, or print a record of "default" values?   See
1276      * comment in server_kdb.c to help decide.
1277      */
1278     tl_data.tl_data_type = KRB5_TL_KADM_DATA;
1279     if (krb5_dbe_lookup_tl_data(arg->kcontext, kdb, &tl_data)
1280 	|| (tl_data.tl_data_length == 0))
1281 	 return 0;
1282 
1283     memset(&adb, 0, sizeof(adb));
1284     xdrmem_create(&xdrs, (const caddr_t) tl_data.tl_data_contents,
1285 		  tl_data.tl_data_length, XDR_DECODE);
1286     if (! xdr_osa_princ_ent_rec(&xdrs, &adb)) {
1287 	 xdr_destroy(&xdrs);
1288 	 return(KADM5_XDR_FAILURE);
1289     }
1290     xdr_destroy(&xdrs);
1291 
1292     krb5_unparse_name(arg->kcontext, kdb->princ, &princstr);
1293     fprintf(arg->ofile, "princ\t%s\t", princstr);
1294     if(adb.policy == NULL)
1295 	fputc('\t', arg->ofile);
1296     else
1297 	fprintf(arg->ofile, "%s\t", adb.policy);
1298     fprintf(arg->ofile, "%lx\t%d\t%d\t%d", adb.aux_attributes,
1299 	    adb.old_key_len,adb.old_key_next, adb.admin_history_kvno);
1300 
1301     for (x = 0; x < adb.old_key_len; x++) {
1302 	 foundcrc = 0;
1303 	 for (y = 0; y < adb.old_keys[x].n_key_data; y++) {
1304 	      krb5_key_data *key_data = &adb.old_keys[x].key_data[y];
1305 
1306 	      if (key_data->key_data_type[0] != ENCTYPE_DES_CBC_CRC)
1307 		   continue;
1308 	      if (foundcrc) {
1309 				fprintf(stderr,
1310 				    gettext("Warning!  Multiple DES-CBC-CRC "
1311 					"keys for principal %s; skipping "
1312 					"duplicates.\n"),
1313 			   princstr);
1314 		   continue;
1315 	      }
1316 	      foundcrc++;
1317 
1318 	      fputc('\t', arg->ofile);
1319 	      print_key_data(arg->ofile, key_data);
1320 	 }
1321 	 if (!foundcrc)
1322 			fprintf(stderr,
1323 			    gettext("Warning!  No DES-CBC-CRC key "
1324 				"for principal %s, cannot generate "
1325 				"OV-compatible record; skipping\n"),
1326 		      princstr);
1327     }
1328 
1329     fputc('\n', arg->ofile);
1330     free(princstr);
1331     return 0;
1332 }
1333 
1334 /*
1335  * usage is:
1336  *	dump_db [-i] [-old] [-b6] [-b7] [-ov] [-verbose] [-mkey_convert]
1337  *		[-new_mkey_file mkey_file] [-rev] [-recurse]
1338  *		[filename [principals...]]
1339  */
1340 void
1341 dump_db(argc, argv)
1342     int		argc;
1343     char	**argv;
1344 {
1345     FILE		*f;
1346     struct dump_args	arglist;
1347 /* Solaris Kerberos */
1348 #if 0
1349     char		*programname;
1350 #endif
1351     char		*ofile;
1352     krb5_error_code	kret, retval;
1353     dump_version	*dump;
1354     int			aindex;
1355     krb5_boolean	locked;
1356     char		*new_mkey_file = 0;
1357     bool_t		dump_sno = FALSE;
1358     kdb_log_context	*log_ctx;
1359     /* Solaris Kerberos: adding support for -rev/recurse flags */
1360     int			db_arg_index = 0;
1361     char		*db_args[3] = {NULL, NULL, NULL};
1362 
1363     /*
1364      * Parse the arguments.
1365      */
1366 /* Solaris Kerberos */
1367 #if 0
1368     programname = argv[0];
1369     if (strrchr(programname, (int) '/'))
1370 	programname = strrchr(argv[0], (int) '/') + 1;
1371 #endif
1372     ofile = (char *) NULL;
1373     dump = &r1_3_version;
1374     arglist.verbose = 0;
1375     new_mkey_file = 0;
1376     mkey_convert = 0;
1377     backwards = 0;
1378     recursive = 0;
1379     log_ctx = util_context->kdblog_context;
1380 
1381     /*
1382      * Parse the qualifiers.
1383      */
1384     for (aindex = 1; aindex < argc; aindex++) {
1385 	if (!strcmp(argv[aindex], oldoption))
1386 	     dump = &old_version;
1387 	else if (!strcmp(argv[aindex], b6option))
1388 	     dump = &beta6_version;
1389 	else if (!strcmp(argv[aindex], b7option))
1390 	     dump = &beta7_version;
1391 	else if (!strcmp(argv[aindex], ovoption))
1392 	     dump = &ov_version;
1393 	else if (!strcmp(argv[aindex], ipropoption)) {
1394 			if (log_ctx && log_ctx->iproprole) {
1395 				dump = &iprop_version;
1396 				/*
1397 				 * dump_sno is used to indicate if the serial
1398 				 * # should be populated in the output
1399 				 * file to be used later by iprop for updating
1400 				 * the slave's update log when loading
1401 				 */
1402 				dump_sno = TRUE;
1403 			} else {
1404 				fprintf(stderr, gettext("Iprop not enabled\n"));
1405 				exit_status++;
1406 				return;
1407 			}
1408 		}
1409 	else if (!strcmp(argv[aindex], verboseoption))
1410 	    arglist.verbose++;
1411 	else if (!strcmp(argv[aindex], "-mkey_convert"))
1412 	    mkey_convert = 1;
1413 	else if (!strcmp(argv[aindex], "-new_mkey_file")) {
1414 	    new_mkey_file = argv[++aindex];
1415 	    mkey_convert = 1;
1416         } else if (!strcmp(argv[aindex], "-rev")) {
1417 	    /* Solaris Kerberos: adding support for -rev/recurse flags */
1418 	    /* hack to pass args to db specific plugin */
1419 	    db_args[db_arg_index++] = "rev";
1420 	} else if (!strcmp(argv[aindex], "-recurse")) {
1421 	    /* hack to pass args to db specific plugin */
1422 	    db_args[db_arg_index++] = "recurse";
1423 	} else
1424 	    break;
1425     }
1426 
1427     arglist.names = (char **) NULL;
1428     arglist.nnames = 0;
1429     if (aindex < argc) {
1430 	ofile = argv[aindex];
1431 	aindex++;
1432 	if (aindex < argc) {
1433 	    arglist.names = &argv[aindex];
1434 	    arglist.nnames = argc - aindex;
1435 	}
1436     }
1437 
1438     /*
1439      * Make sure the database is open.  The policy database only has
1440      * to be opened if we try a dump that uses it.
1441      */
1442     if (!dbactive) {
1443 	/* Solaris Kerberos */
1444 	com_err(progname, 0, Err_no_database); /* Solaris Kerberos */
1445 	exit_status++;
1446 	return;
1447     }
1448 
1449     /*
1450      * If we're doing a master key conversion, set up for it.
1451      */
1452     if (mkey_convert) {
1453 	    if (!valid_master_key) {
1454 		    /* TRUE here means read the keyboard, but only once */
1455 		    retval = krb5_db_fetch_mkey(util_context,
1456 						master_princ,
1457 						global_params.enctype,
1458 						TRUE, FALSE,
1459 						(char *) NULL, 0,
1460 						&master_key);
1461 		    if (retval) {
1462 			    /* Solaris Kerberos */
1463 			    com_err(progname, retval,
1464 				    gettext("while reading master key"));
1465 			    exit(1);
1466 		    }
1467 		    retval = krb5_db_verify_master_key(util_context,
1468 						       master_princ,
1469 						       &master_key);
1470 		    if (retval) {
1471 			    /* Solaris Kerberos */
1472 			    com_err(progname, retval,
1473 				    gettext("while verifying master key"));
1474 			    exit(1);
1475 		    }
1476 	    }
1477 	    if (!new_mkey_file)
1478 		    printf(gettext("Please enter new master key....\n"));
1479 	    if ((retval = krb5_db_fetch_mkey(util_context, master_princ,
1480 					     global_params.enctype,
1481 					     (new_mkey_file == 0) ?
1482 					        (krb5_boolean) 1 : 0,
1483 					     TRUE,
1484 					     new_mkey_file, 0,
1485 					     &new_master_key))) {
1486 		    /* Solaris Kerberos */
1487 		    com_err(progname, retval,
1488 			    gettext("while reading new master key"));
1489 		    exit(1);
1490 	    }
1491     }
1492 
1493     kret = 0;
1494     locked = 0;
1495     if (ofile && strcmp(ofile, "-")) {
1496 	/*
1497 	 * Discourage accidental dumping to filenames beginning with '-'.
1498 	 */
1499 	if (ofile[0] == '-')
1500 	    usage();
1501 	/*
1502 	 * Make sure that we don't open and truncate on the fopen,
1503 	 * since that may hose an on-going kprop process.
1504 	 *
1505 	 * We could also control this by opening for read and
1506 	 * write, doing an flock with LOCK_EX, and then
1507 	 * truncating the file once we have gotten the lock,
1508 	 * but that would involve more OS dependencies than I
1509 	 * want to get into.
1510 	 */
1511 	unlink(ofile);
1512 	if (!(f = fopen(ofile, "w"))) {
1513 			/* Solaris Kerberos */
1514 			fprintf(stderr, gettext(ofopen_error),
1515 		    progname, ofile, error_message(errno));
1516 	    exit_status++;
1517 	    return;
1518        }
1519 	if ((kret = krb5_lock_file(util_context,
1520 				   fileno(f),
1521 				   KRB5_LOCKMODE_EXCLUSIVE))) {
1522 			/* Solaris Kerberos */
1523 			fprintf(stderr, gettext(oflock_error),
1524 		    progname, ofile, error_message(kret));
1525 	    exit_status++;
1526 	}
1527 	else
1528 	    locked = 1;
1529     } else {
1530 	f = stdout;
1531     }
1532     if (f && !(kret)) {
1533 	/* Solaris Kerberos */
1534 	arglist.programname = progname;
1535 	arglist.ofile = f;
1536 	arglist.kcontext = util_context;
1537 	fprintf(arglist.ofile, "%s", dump->header);
1538 
1539 	if (dump_sno) {
1540 		if (ulog_map(util_context, &global_params, FKCOMMAND)) {
1541 			/* Solaris Kerberos */
1542 			fprintf(stderr,
1543 			    gettext("%s: Could not map log\n"), progname);
1544 			exit_status++;
1545 			goto error;
1546 		}
1547 
1548 		/*
1549 		 * We grab the lock twice (once again in the iterator call),
1550 		 * but that's ok since the lock func handles incr locks held.
1551 		 */
1552 		if (krb5_db_lock(util_context, KRB5_LOCKMODE_SHARED)) {
1553 			/* Solaris Kerberos */
1554 			fprintf(stderr,
1555 			    gettext("%s: Couldn't grab lock\n"), progname);
1556 			exit_status++;
1557 			goto error;
1558 		}
1559 
1560 		fprintf(f, " %u", log_ctx->ulog->kdb_last_sno);
1561 		fprintf(f, " %u", log_ctx->ulog->kdb_last_time.seconds);
1562 		fprintf(f, " %u", log_ctx->ulog->kdb_last_time.useconds);
1563 	}
1564 
1565 	if (dump->header[strlen(dump->header)-1] != '\n')
1566 	     fputc('\n', arglist.ofile);
1567 
1568 	/* Solaris Kerberos: adding support for -rev/recurse flags */
1569 	/* don't pass in db_args if there aren't any */
1570 	if ((kret = krb5_db_iterate(util_context,
1571 				    NULL,
1572 				    dump->dump_princ,
1573 				    (krb5_pointer) &arglist,
1574 				    db_arg_index > 0 ? (char **)&db_args : NULL))) {
1575 	     /* Solaris Kerberos */
1576 	     fprintf(stderr, dumprec_err,
1577 		     progname, dump->name, error_message(kret));
1578 	     exit_status++;
1579 		if (dump_sno)
1580 			(void) krb5_db_unlock(util_context);
1581 	}
1582 	if (dump->dump_policy &&
1583 	    (kret = krb5_db_iter_policy( util_context, "*", dump->dump_policy,
1584 					 &arglist))) {
1585 	     /* Solaris Kerberos */
1586 	     fprintf(stderr, gettext(dumprec_err),
1587 		progname, dump->name,
1588 		     error_message(kret));
1589 	     exit_status++;
1590 	}
1591 
1592 error:
1593 	if (ofile && f != stdout && !exit_status) {
1594 	    if (locked) {
1595 		(void) krb5_lock_file(util_context, fileno(f), KRB5_LOCKMODE_UNLOCK);
1596 		locked = 0;
1597 	    }
1598 	    fclose(f);
1599 	    update_ok_file(ofile);
1600 	}
1601     }
1602     if (locked)
1603 	(void) krb5_lock_file(util_context, fileno(f), KRB5_LOCKMODE_UNLOCK);
1604 }
1605 
1606 /*
1607  * Read a string of bytes while counting the number of lines passed.
1608  */
1609 static int
1610 read_string(f, buf, len, lp)
1611     FILE	*f;
1612     char	*buf;
1613     int		len;
1614     int		*lp;
1615 {
1616     int c;
1617     int i, retval;
1618 
1619     retval = 0;
1620     for (i=0; i<len; i++) {
1621 	c = fgetc(f);
1622 	if (c < 0) {
1623 	    retval = 1;
1624 	    break;
1625 	}
1626 	if (c == '\n')
1627 	    (*lp)++;
1628 	buf[i] = (char) c;
1629     }
1630     buf[len] = '\0';
1631     return(retval);
1632 }
1633 
1634 /*
1635  * Read a string of two character representations of bytes.
1636  */
1637 static int
1638 read_octet_string(f, buf, len)
1639     FILE	*f;
1640     krb5_octet	*buf;
1641     int		len;
1642 {
1643     int c;
1644     int i, retval;
1645 
1646     retval = 0;
1647     for (i=0; i<len; i++) {
1648 	if (fscanf(f, "%02x", &c) != 1) {
1649 	    retval = 1;
1650 	    break;
1651 	}
1652 	buf[i] = (krb5_octet) c;
1653     }
1654     return(retval);
1655 }
1656 
1657 /*
1658  * Find the end of an old format record.
1659  */
1660 static void
1661 find_record_end(f, fn, lineno)
1662     FILE	*f;
1663     char	*fn;
1664     int		lineno;
1665 {
1666     int	ch;
1667 
1668     if (((ch = fgetc(f)) != ';') || ((ch = fgetc(f)) != '\n')) {
1669 		fprintf(stderr, gettext(trash_end_fmt), fn, lineno);
1670 	while (ch != '\n') {
1671 	    putc(ch, stderr);
1672 	    ch = fgetc(f);
1673 	}
1674 	putc(ch, stderr);
1675     }
1676 }
1677 
1678 #if 0
1679 /*
1680  * update_tl_data()	- Generate the tl_data entries.
1681  */
1682 static krb5_error_code
1683 update_tl_data(kcontext, dbentp, mod_name, mod_date, last_pwd_change)
1684     krb5_context	kcontext;
1685     krb5_db_entry	*dbentp;
1686     krb5_principal	mod_name;
1687     krb5_timestamp	mod_date;
1688     krb5_timestamp	last_pwd_change;
1689 {
1690     krb5_error_code	kret;
1691 
1692     kret = 0 ;
1693 
1694     /*
1695      * Handle modification principal.
1696      */
1697     if (mod_name) {
1698 	krb5_tl_mod_princ	mprinc;
1699 
1700 	memset(&mprinc, 0, sizeof(mprinc));
1701 	if (!(kret = krb5_copy_principal(kcontext,
1702 					 mod_name,
1703 					 &mprinc.mod_princ))) {
1704 	    mprinc.mod_date = mod_date;
1705 	    kret = krb5_dbe_encode_mod_princ_data(kcontext,
1706 						  &mprinc,
1707 						  dbentp);
1708 	}
1709 	if (mprinc.mod_princ)
1710 	    krb5_free_principal(kcontext, mprinc.mod_princ);
1711     }
1712 
1713     /*
1714      * Handle last password change.
1715      */
1716     if (!kret) {
1717 	krb5_tl_data	*pwchg;
1718 	krb5_boolean	linked;
1719 
1720 	/* Find a previously existing entry */
1721 	for (pwchg = dbentp->tl_data;
1722 	     (pwchg) && (pwchg->tl_data_type != KRB5_TL_LAST_PWD_CHANGE);
1723 	     pwchg = pwchg->tl_data_next);
1724 
1725 	/* Check to see if we found one. */
1726 	linked = 0;
1727 	if (!pwchg) {
1728 	    /* No, allocate a new one */
1729 	    if ((pwchg = (krb5_tl_data *) malloc(sizeof(krb5_tl_data)))) {
1730 		memset(pwchg, 0, sizeof(krb5_tl_data));
1731 		if (!(pwchg->tl_data_contents =
1732 		      (krb5_octet *) malloc(sizeof(krb5_timestamp)))) {
1733 		    free(pwchg);
1734 		    pwchg = (krb5_tl_data *) NULL;
1735 		}
1736 		else {
1737 		    pwchg->tl_data_type = KRB5_TL_LAST_PWD_CHANGE;
1738 		    pwchg->tl_data_length =
1739 			(krb5_int16) sizeof(krb5_timestamp);
1740 		}
1741 	    }
1742 	}
1743 	else
1744 	    linked = 1;
1745 
1746 	/* Do we have an entry? */
1747 	if (pwchg && pwchg->tl_data_contents) {
1748 	    /* Encode it */
1749 	    krb5_kdb_encode_int32(last_pwd_change, pwchg->tl_data_contents);
1750 	    /* Link it in if necessary */
1751 	    if (!linked) {
1752 		pwchg->tl_data_next = dbentp->tl_data;
1753 		dbentp->tl_data = pwchg;
1754 		dbentp->n_tl_data++;
1755 	    }
1756 	}
1757 	else
1758 	    kret = ENOMEM;
1759     }
1760 
1761     return(kret);
1762 }
1763 #endif
1764 
1765 /*
1766  * process_k5beta_record()	- Handle a dump record in old format.
1767  *
1768  * Returns -1 for end of file, 0 for success and 1 for failure.
1769  */
1770 static int
1771 process_k5beta_record(fname, kcontext, filep, verbose, linenop)
1772     char		*fname;
1773     krb5_context	kcontext;
1774     FILE		*filep;
1775     int			verbose;
1776     int			*linenop;
1777 {
1778     int			nmatched;
1779     int			retval;
1780     krb5_db_entry	dbent;
1781     int			name_len, mod_name_len, key_len;
1782     int			alt_key_len, salt_len, alt_salt_len;
1783     char		*name;
1784     char		*mod_name;
1785     int			tmpint1, tmpint2, tmpint3;
1786     int			error;
1787     const char		*try2read;
1788     int			i;
1789     krb5_key_data	*pkey, *akey;
1790     krb5_timestamp	last_pwd_change, mod_date;
1791     krb5_principal	mod_princ;
1792     krb5_error_code	kret;
1793     krb5_octet 		*shortcopy1 = NULL; /* SUNWresync121 memleak fix */
1794     krb5_octet 		*shortcopy2 = NULL;
1795 
1796     try2read = (char *) NULL;
1797     (*linenop)++;
1798     retval = 1;
1799     memset((char *)&dbent, 0, sizeof(dbent));
1800 
1801     /* Make sure we've got key_data entries */
1802     if (krb5_dbe_create_key_data(kcontext, &dbent) ||
1803 	krb5_dbe_create_key_data(kcontext, &dbent)) {
1804 	krb5_db_free_principal(kcontext, &dbent, 1);
1805 	return(1);
1806     }
1807     pkey = &dbent.key_data[0];
1808     akey = &dbent.key_data[1];
1809 
1810     /*
1811      * Match the sizes.  6 tokens to match.
1812      */
1813     nmatched = fscanf(filep, "%d\t%d\t%d\t%d\t%d\t%d\t",
1814 		      &name_len, &mod_name_len, &key_len,
1815 		      &alt_key_len, &salt_len, &alt_salt_len);
1816     if (nmatched == 6) {
1817         pkey->key_data_length[0] = key_len;
1818 	akey->key_data_length[0] = alt_key_len;
1819 	pkey->key_data_length[1] = salt_len;
1820 	akey->key_data_length[1] = alt_salt_len;
1821 	name = (char *) NULL;
1822 	mod_name = (char *) NULL;
1823 	/*
1824 	 * Get the memory for the variable length fields.
1825 	 */
1826 	if ((name = (char *) malloc((size_t) (name_len + 1))) &&
1827 	    (mod_name = (char *) malloc((size_t) (mod_name_len + 1))) &&
1828 	    (!key_len ||
1829 	     (pkey->key_data_contents[0] =
1830 	      (krb5_octet *) malloc((size_t) (key_len + 1)))) &&
1831 	    (!alt_key_len ||
1832 	     (akey->key_data_contents[0] =
1833 	      (krb5_octet *) malloc((size_t) (alt_key_len + 1)))) &&
1834 	    (!salt_len ||
1835 	     (pkey->key_data_contents[1] =
1836 	      (krb5_octet *) malloc((size_t) (salt_len + 1)))) &&
1837 	    (!alt_salt_len ||
1838 	     (akey->key_data_contents[1] =
1839 	      (krb5_octet *) malloc((size_t) (alt_salt_len + 1))))
1840 	    ) {
1841 	    error = 0;
1842 
1843 	    /* Read the principal name */
1844 	    if (read_string(filep, name, name_len, linenop)) {
1845 		try2read = read_name_string;
1846 		error++;
1847 	    }
1848 	    /* Read the key type */
1849 	    if (!error && (fscanf(filep, "\t%d\t", &tmpint1) != 1)) {
1850 		try2read = read_key_type;
1851 		error++;
1852 	    }
1853 	    pkey->key_data_type[0] = tmpint1;
1854 	    /* Read the old format key */
1855 	    if (!error && read_octet_string(filep,
1856 					    pkey->key_data_contents[0],
1857 					    pkey->key_data_length[0])) {
1858 		try2read = read_key_data;
1859 		error++;
1860 	    }
1861 	    /* convert to a new format key */
1862 	    /* the encrypted version is stored as the unencrypted key length
1863 	       (4 bytes, MSB first) followed by the encrypted key. */
1864 	    if ((pkey->key_data_length[0] > 4)
1865 		&& (pkey->key_data_contents[0][0] == 0)
1866 		&& (pkey->key_data_contents[0][1] == 0)) {
1867 	      /* this really does look like an old key, so drop and swap */
1868 	      /* the *new* length is 2 bytes, LSB first, sigh. */
1869 	      size_t shortlen = pkey->key_data_length[0]-4+2;
1870 	      krb5_octet *origdata = pkey->key_data_contents[0];
1871 
1872 		    shortcopy1 = (krb5_octet *) malloc(shortlen);
1873 		    if (shortcopy1) {
1874 			shortcopy1[0] = origdata[3];
1875 			shortcopy1[1] = origdata[2];
1876 			memcpy(shortcopy1 + 2, origdata + 4, shortlen - 2);
1877 			free(origdata);
1878 			pkey->key_data_length[0] = shortlen;
1879 			pkey->key_data_contents[0] = shortcopy1;
1880 		    } else {
1881 			fprintf(stderr, gettext(no_mem_fmt), fname, *linenop);
1882 			error++;
1883 		    }
1884 	    }
1885 
1886 	    /* Read principal attributes */
1887 	    if (!error && (fscanf(filep,
1888 				  "\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t%u\t",
1889 				  &tmpint1, &dbent.max_life,
1890 				  &dbent.max_renewable_life,
1891 				  &tmpint2, &dbent.expiration,
1892 				  &dbent.pw_expiration, &last_pwd_change,
1893 				  &dbent.last_success, &dbent.last_failed,
1894 				  &tmpint3) != 10)) {
1895 		try2read = read_pr_data1;
1896 		error++;
1897 	    }
1898 	    pkey->key_data_kvno = tmpint1;
1899 	    dbent.fail_auth_count = tmpint3;
1900 	    /* Read modifier name */
1901 	    if (!error && read_string(filep,
1902 				      mod_name,
1903 				      mod_name_len,
1904 				      linenop)) {
1905 		try2read = read_mod_name;
1906 		error++;
1907 	    }
1908 	    /* Read second set of attributes */
1909 	    if (!error && (fscanf(filep, "\t%u\t%u\t%u\t",
1910 				  &mod_date, &dbent.attributes,
1911 				  &tmpint1) != 3)) {
1912 		try2read = read_pr_data2;
1913 		error++;
1914 	    }
1915 	    pkey->key_data_type[1] = tmpint1;
1916 	    /* Read salt data */
1917 	    if (!error && read_octet_string(filep,
1918 					    pkey->key_data_contents[1],
1919 					    pkey->key_data_length[1])) {
1920 		try2read = read_salt_data;
1921 		error++;
1922 	    }
1923 	    /* Read alternate key type */
1924 	    if (!error && (fscanf(filep, "\t%u\t", &tmpint1) != 1)) {
1925 		try2read = read_akey_type;
1926 		error++;
1927 	    }
1928 	    akey->key_data_type[0] = tmpint1;
1929 	    /* Read alternate key */
1930 	    if (!error && read_octet_string(filep,
1931 					    akey->key_data_contents[0],
1932 					    akey->key_data_length[0])) {
1933 		try2read = read_akey_data;
1934 		error++;
1935 	    }
1936 
1937 	    /* convert to a new format key */
1938 	    /* the encrypted version is stored as the unencrypted key length
1939 	       (4 bytes, MSB first) followed by the encrypted key. */
1940 	    if ((akey->key_data_length[0] > 4)
1941 		&& (akey->key_data_contents[0][0] == 0)
1942 		&& (akey->key_data_contents[0][1] == 0)) {
1943 	      /* this really does look like an old key, so drop and swap */
1944 	      /* the *new* length is 2 bytes, LSB first, sigh. */
1945 	      size_t shortlen = akey->key_data_length[0]-4+2;
1946 
1947 		    krb5_octet *origdata = akey->key_data_contents[0];
1948 
1949 		    shortcopy2 = (krb5_octet *) malloc(shortlen);
1950 		    if (shortcopy2) {
1951 			shortcopy2[0] = origdata[3];
1952 			shortcopy2[1] = origdata[2];
1953 			memcpy(shortcopy2 + 2,
1954 			    origdata + 4, shortlen - 2);
1955 			free(origdata);
1956 			akey->key_data_length[0] = shortlen;
1957 			akey->key_data_contents[0] = shortcopy2;
1958 		    } else {
1959 			fprintf(stderr, gettext(no_mem_fmt), fname, *linenop);
1960 			error++;
1961 		    }
1962 	    }
1963 
1964 	    /* Read alternate salt type */
1965 	    if (!error && (fscanf(filep, "\t%u\t", &tmpint1) != 1)) {
1966 		try2read = read_asalt_type;
1967 		error++;
1968 	    }
1969 	    akey->key_data_type[1] = tmpint1;
1970 	    /* Read alternate salt data */
1971 	    if (!error && read_octet_string(filep,
1972 					    akey->key_data_contents[1],
1973 					    akey->key_data_length[1])) {
1974 		try2read = read_asalt_data;
1975 		error++;
1976 	    }
1977 	    /* Read expansion data - discard it */
1978 	    if (!error) {
1979 		for (i=0; i<8; i++) {
1980 		    if (fscanf(filep, "\t%u", &tmpint1) != 1) {
1981 			try2read = read_exp_data;
1982 			error++;
1983 			break;
1984 		    }
1985 		}
1986 		if (!error)
1987 		    find_record_end(filep, fname, *linenop);
1988 	    }
1989 
1990 	    /*
1991 	     * If no error, then we're done reading.  Now parse the names
1992 	     * and store the database dbent.
1993 	     */
1994 	    if (!error) {
1995 		if (!(kret = krb5_parse_name(kcontext,
1996 					     name,
1997 					     &dbent.princ))) {
1998 		    if (!(kret = krb5_parse_name(kcontext,
1999 						 mod_name,
2000 						 &mod_princ))) {
2001 			if (!(kret =
2002 			      krb5_dbe_update_mod_princ_data(kcontext,
2003 							     &dbent,
2004 							     mod_date,
2005 							     mod_princ)) &&
2006 			    !(kret =
2007 			      krb5_dbe_update_last_pwd_change(kcontext,
2008 							      &dbent,
2009 							      last_pwd_change))) {
2010 			    int one = 1;
2011 
2012 			    dbent.len = KRB5_KDB_V1_BASE_LENGTH;
2013 			    pkey->key_data_ver = (pkey->key_data_type[1] || pkey->key_data_length[1]) ?
2014 				2 : 1;
2015 			    akey->key_data_ver = (akey->key_data_type[1] || akey->key_data_length[1]) ?
2016 				2 : 1;
2017 			    if ((pkey->key_data_type[0] ==
2018 				 akey->key_data_type[0]) &&
2019 				(pkey->key_data_type[1] ==
2020 				 akey->key_data_type[1]))
2021 				dbent.n_key_data--;
2022 			    else if ((akey->key_data_type[0] == 0)
2023 				     && (akey->key_data_length[0] == 0)
2024 				     && (akey->key_data_type[1] == 0)
2025 				     && (akey->key_data_length[1] == 0))
2026 			        dbent.n_key_data--;
2027 
2028 			    dbent.mask = KADM5_LOAD | KADM5_PRINCIPAL | KADM5_ATTRIBUTES |
2029 				KADM5_MAX_LIFE | KADM5_MAX_RLIFE | KADM5_KEY_DATA |
2030 				KADM5_PRINC_EXPIRE_TIME | KADM5_LAST_SUCCESS |
2031 				KADM5_LAST_FAILED | KADM5_FAIL_AUTH_COUNT;
2032 
2033 			    if ((kret = krb5_db_put_principal(kcontext,
2034 							      &dbent,
2035 							      &one)) ||
2036 				(one != 1)) {
2037 				fprintf(stderr, gettext(store_err_fmt),
2038 					fname, *linenop, name,
2039 					error_message(kret));
2040 				error++;
2041 			    }
2042 			    else {
2043 				if (verbose)
2044 				    fprintf(stderr,
2045 							gettext(add_princ_fmt),
2046 							name);
2047 				retval = 0;
2048 			    }
2049 			    dbent.n_key_data = 2;
2050 			}
2051 			krb5_free_principal(kcontext, mod_princ);
2052 		    }
2053 		    else {
2054 			fprintf(stderr,
2055 				gettext(parse_err_fmt),
2056 				fname, *linenop, mod_name,
2057 				error_message(kret));
2058 			error++;
2059 		    }
2060 		}
2061 		else {
2062 		    fprintf(stderr, gettext(parse_err_fmt),
2063 			    fname, *linenop, name, error_message(kret));
2064 		    error++;
2065 		}
2066 	    }
2067 	    else {
2068 	    fprintf(stderr, gettext(no_mem_fmt), fname, *linenop, try2read);
2069 	    }
2070 	}
2071 	else {
2072 		fprintf(stderr, gettext(read_err_fmt), fname, *linenop);
2073 	}
2074 
2075 	krb5_db_free_principal(kcontext, &dbent, 1);
2076 	if (mod_name)
2077 	    free(mod_name);
2078 	if (name)
2079 	    free(name);
2080     }
2081     else {
2082 	if (nmatched != EOF)
2083 	   fprintf(stderr, gettext(rhead_err_fmt),
2084 		fname, *linenop);
2085 	else
2086 	    retval = -1;
2087     }
2088 
2089     if (shortcopy1)
2090 	free(shortcopy1);
2091     if (shortcopy2)
2092 	free(shortcopy2);
2093 
2094     return(retval);
2095 }
2096 
2097 /*
2098  * process_k5beta6_record()	- Handle a dump record in krb5b6 format.
2099  *
2100  * Returns -1 for end of file, 0 for success and 1 for failure.
2101  */
2102 static int
2103 process_k5beta6_record(fname, kcontext, filep, verbose, linenop)
2104     char		*fname;
2105     krb5_context	kcontext;
2106     FILE		*filep;
2107     int			verbose;
2108     int			*linenop;
2109 {
2110     int			retval;
2111     krb5_db_entry	dbentry;
2112     krb5_int32		t1, t2, t3, t4, t5, t6, t7, t8, t9;
2113     int			nread;
2114     int			error;
2115     int			i, j, one;
2116     char		*name;
2117     krb5_key_data	*kp, *kdatap;
2118     krb5_tl_data	**tlp, *tl;
2119     krb5_octet 		*op;
2120     krb5_error_code	kret;
2121     const char		*try2read;
2122 
2123     try2read = (char *) NULL;
2124     memset((char *) &dbentry, 0, sizeof(dbentry));
2125     (*linenop)++;
2126     retval = 1;
2127     name = (char *) NULL;
2128     kp = (krb5_key_data *) NULL;
2129     op = (krb5_octet *) NULL;
2130     error = 0;
2131     kret = 0;
2132     nread = fscanf(filep, "%d\t%d\t%d\t%d\t%d\t", &t1, &t2, &t3, &t4, &t5);
2133     if (nread == 5) {
2134 	/* Get memory for flattened principal name */
2135 	if (!(name = (char *) malloc((size_t) t2 + 1)))
2136 	    error++;
2137 
2138 	/* Get memory for and form tagged data linked list */
2139 	tlp = &dbentry.tl_data;
2140 	for (i=0; i<t3; i++) {
2141 	    if ((*tlp = (krb5_tl_data *) malloc(sizeof(krb5_tl_data)))) {
2142 		memset(*tlp, 0, sizeof(krb5_tl_data));
2143 		tlp = &((*tlp)->tl_data_next);
2144 		dbentry.n_tl_data++;
2145 	    }
2146 	    else {
2147 		error++;
2148 		break;
2149 	    }
2150 	}
2151 
2152 	/* Get memory for key list */
2153 	if (t4 && !(kp = (krb5_key_data *) malloc((size_t)
2154 						  (t4*sizeof(krb5_key_data)))))
2155 	    error++;
2156 
2157 	/* Get memory for extra data */
2158 	if (t5 && !(op = (krb5_octet *) malloc((size_t) t5)))
2159 	    error++;
2160 
2161 	if (!error) {
2162 	    dbentry.len = t1;
2163 	    dbentry.n_key_data = t4;
2164 	    dbentry.e_length = t5;
2165 	    if (kp) {
2166 		memset(kp, 0, (size_t) (t4*sizeof(krb5_key_data)));
2167 		dbentry.key_data = kp;
2168 		kp = (krb5_key_data *) NULL;
2169 	    }
2170 	    if (op) {
2171 		memset(op, 0, (size_t) t5);
2172 		dbentry.e_data = op;
2173 		op = (krb5_octet *) NULL;
2174 	    }
2175 
2176 	    /* Read in and parse the principal name */
2177 	    if (!read_string(filep, name, t2, linenop) &&
2178 		!(kret = krb5_parse_name(kcontext, name, &dbentry.princ))) {
2179 
2180 		/* Get the fixed principal attributes */
2181 		nread = fscanf(filep, "%d\t%d\t%d\t%d\t%d\t%d\t%d\t%d\t",
2182 			       &t2, &t3, &t4, &t5, &t6, &t7, &t8, &t9);
2183 		if (nread == 8) {
2184 		    dbentry.attributes = (krb5_flags) t2;
2185 		    dbentry.max_life = (krb5_deltat) t3;
2186 		    dbentry.max_renewable_life = (krb5_deltat) t4;
2187 		    dbentry.expiration = (krb5_timestamp) t5;
2188 		    dbentry.pw_expiration = (krb5_timestamp) t6;
2189 		    dbentry.last_success = (krb5_timestamp) t7;
2190 		    dbentry.last_failed = (krb5_timestamp) t8;
2191 		    dbentry.fail_auth_count = (krb5_kvno) t9;
2192 		    dbentry.mask = KADM5_LOAD | KADM5_PRINCIPAL | KADM5_ATTRIBUTES |
2193 			KADM5_MAX_LIFE | KADM5_MAX_RLIFE |
2194 			KADM5_PRINC_EXPIRE_TIME | KADM5_LAST_SUCCESS |
2195 			KADM5_LAST_FAILED | KADM5_FAIL_AUTH_COUNT;
2196 		} else {
2197 		    try2read = read_nint_data;
2198 		    error++;
2199 		}
2200 
2201 		/*
2202 		 * Get the tagged data.
2203 		 *
2204 		 * Really, this code ought to discard tl data types
2205 		 * that it knows are special to the current version
2206 		 * and were not supported in the previous version.
2207 		 * But it's a pain to implement that here, and doing
2208 		 * it at dump time has almost as good an effect, so
2209 		 * that's what I did.  [krb5-admin/89]
2210 		 */
2211 		if (!error && dbentry.n_tl_data) {
2212 		    for (tl = dbentry.tl_data; tl; tl = tl->tl_data_next) {
2213 			nread = fscanf(filep, "%d\t%d\t", &t1, &t2);
2214 			if (nread == 2) {
2215 			    tl->tl_data_type = (krb5_int16) t1;
2216 			    tl->tl_data_length = (krb5_int16) t2;
2217 			    if (tl->tl_data_length) {
2218 				if (!(tl->tl_data_contents =
2219 				      (krb5_octet *) malloc((size_t) t2+1)) ||
2220 				    read_octet_string(filep,
2221 						      tl->tl_data_contents,
2222 						      t2)) {
2223 				    try2read = read_tcontents;
2224 				    error++;
2225 				    break;
2226 				}
2227 				/* test to set mask fields */
2228 				if (t1 == KRB5_TL_KADM_DATA) {
2229 				    XDR xdrs;
2230 				    osa_princ_ent_rec osa_princ_ent;
2231 
2232 				    /*
2233 				     * Assuming aux_attributes will always be
2234 				     * there
2235 				     */
2236 				    dbentry.mask |= KADM5_AUX_ATTRIBUTES;
2237 
2238 				    /* test for an actual policy reference */
2239 				    memset(&osa_princ_ent, 0, sizeof(osa_princ_ent));
2240 				    xdrmem_create(&xdrs, (char *)tl->tl_data_contents,
2241 					    tl->tl_data_length, XDR_DECODE);
2242 				    if (xdr_osa_princ_ent_rec(&xdrs, &osa_princ_ent) &&
2243 					    (osa_princ_ent.aux_attributes & KADM5_POLICY) &&
2244 					    osa_princ_ent.policy != NULL) {
2245 
2246 					dbentry.mask |= KADM5_POLICY;
2247 					kdb_free_entry(NULL, NULL, &osa_princ_ent);
2248 				    }
2249 				    xdr_destroy(&xdrs);
2250 				}
2251 			    }
2252 			    else {
2253 				/* Should be a null field */
2254 				nread = fscanf(filep, "%d", &t9);
2255 				if ((nread != 1) || (t9 != -1)) {
2256 				    error++;
2257 				    try2read = read_tcontents;
2258 				    break;
2259 				}
2260 			    }
2261 			}
2262 			else {
2263 			    try2read = read_ttypelen;
2264 			    error++;
2265 			    break;
2266 			}
2267 		    }
2268 		    if (!error)
2269 			dbentry.mask |= KADM5_TL_DATA;
2270 		}
2271 
2272 		/* Get the key data */
2273 		if (!error && dbentry.n_key_data) {
2274 		    for (i=0; !error && (i<dbentry.n_key_data); i++) {
2275 			kdatap = &dbentry.key_data[i];
2276 			nread = fscanf(filep, "%d\t%d\t", &t1, &t2);
2277 			if (nread == 2) {
2278 			    kdatap->key_data_ver = (krb5_int16) t1;
2279 			    kdatap->key_data_kvno = (krb5_int16) t2;
2280 
2281 			    for (j=0; j<t1; j++) {
2282 				nread = fscanf(filep, "%d\t%d\t", &t3, &t4);
2283 				if (nread == 2) {
2284 				    kdatap->key_data_type[j] = t3;
2285 				    kdatap->key_data_length[j] = t4;
2286 				    if (t4) {
2287 					if (!(kdatap->key_data_contents[j] =
2288 					      (krb5_octet *)
2289 					      malloc((size_t) t4+1)) ||
2290 					    read_octet_string(filep,
2291 							      kdatap->key_data_contents[j],
2292 							      t4)) {
2293 					    try2read = read_kcontents;
2294 					    error++;
2295 					    break;
2296 					}
2297 				    }
2298 				    else {
2299 					/* Should be a null field */
2300 					nread = fscanf(filep, "%d", &t9);
2301 					if ((nread != 1) || (t9 != -1)) {
2302 					    error++;
2303 					    try2read = read_kcontents;
2304 					    break;
2305 					}
2306 				    }
2307 				}
2308 				else {
2309 				    try2read = read_ktypelen;
2310 				    error++;
2311 				    break;
2312 				}
2313 			    }
2314 			}
2315 		    }
2316 		    if (!error)
2317 			dbentry.mask |= KADM5_KEY_DATA;
2318 		}
2319 
2320 		/* Get the extra data */
2321 		if (!error && dbentry.e_length) {
2322 		    if (read_octet_string(filep,
2323 					  dbentry.e_data,
2324 					  (int) dbentry.e_length)) {
2325 			try2read = read_econtents;
2326 			error++;
2327 		    }
2328 		}
2329 		else {
2330 		    nread = fscanf(filep, "%d", &t9);
2331 		    if ((nread != 1) || (t9 != -1)) {
2332 			error++;
2333 			try2read = read_econtents;
2334 		    }
2335 		}
2336 
2337 		/* Finally, find the end of the record. */
2338 		if (!error)
2339 		    find_record_end(filep, fname, *linenop);
2340 
2341 		/*
2342 		 * We have either read in all the data or choked.
2343 		 */
2344 		if (!error) {
2345 		    one = 1;
2346 		    if ((kret = krb5_db_put_principal(kcontext,
2347 						      &dbentry,
2348 						      &one))) {
2349 						fprintf(stderr,
2350 						    gettext(store_err_fmt),
2351 				fname, *linenop,
2352 				name, error_message(kret));
2353 		    }
2354 		    else {
2355 			if (verbose)
2356 							fprintf(stderr,
2357 							    gettext(
2358 								add_princ_fmt),
2359 							    name);
2360 			retval = 0;
2361 		    }
2362 		}
2363 		else {
2364 					fprintf(stderr, gettext(read_err_fmt),
2365 					    fname, *linenop, try2read);
2366 		}
2367 	    }
2368 	    else {
2369 		if (kret)
2370 					fprintf(stderr, gettext(parse_err_fmt),
2371 			    fname, *linenop, name, error_message(kret));
2372 		else
2373 		    fprintf(stderr, gettext(no_mem_fmt),
2374 						fname, *linenop);
2375 	    }
2376 	}
2377 	else {
2378 	    fprintf(stderr,
2379 				gettext(rhead_err_fmt), fname, *linenop);
2380 	}
2381 
2382 	if (op)
2383 	    free(op);
2384 	if (kp)
2385 	    free(kp);
2386 	if (name)
2387 	    free(name);
2388 	krb5_db_free_principal(kcontext, &dbentry, 1);
2389     }
2390     else {
2391 	if (nread == EOF)
2392 	    retval = -1;
2393     }
2394     return(retval);
2395 }
2396 
2397 static int
2398 process_k5beta7_policy(fname, kcontext, filep, verbose, linenop, pol_db)
2399     char		*fname;
2400     krb5_context	kcontext;
2401     FILE		*filep;
2402     int			verbose;
2403     int			*linenop;
2404     void *pol_db;
2405 {
2406     osa_policy_ent_rec rec;
2407     char namebuf[1024];
2408     int nread, ret;
2409 
2410     (*linenop)++;
2411     rec.name = namebuf;
2412 
2413     nread = fscanf(filep, "%1024s\t%d\t%d\t%d\t%d\t%d\t%d", rec.name,
2414 		   &rec.pw_min_life, &rec.pw_max_life,
2415 		   &rec.pw_min_length, &rec.pw_min_classes,
2416 		   &rec.pw_history_num, &rec.policy_refcnt);
2417     if (nread == EOF)
2418 	 return -1;
2419     else if (nread != 7) {
2420 		fprintf(stderr,
2421 		    gettext("cannot parse policy on line %d (%d read)\n"),
2422 		 *linenop, nread);
2423 	 return 1;
2424     }
2425 
2426     if ((ret = krb5_db_create_policy(kcontext, &rec))) {
2427 	 if (ret &&
2428 	     ((ret = krb5_db_put_policy(kcontext, &rec)))) {
2429 	      fprintf(stderr, gettext("cannot create policy on line %d: %s\n"),
2430 		      *linenop, error_message(ret));
2431 	      return 1;
2432 	 }
2433     }
2434     if (verbose)
2435 		fprintf(stderr, gettext("created policy %s\n"), rec.name);
2436 
2437     return 0;
2438 }
2439 
2440 /*
2441  * process_k5beta7_record()	- Handle a dump record in krb5b7 format.
2442  *
2443  * Returns -1 for end of file, 0 for success and 1 for failure.
2444  */
2445 static int
2446 process_k5beta7_record(fname, kcontext, filep, verbose, linenop)
2447     char		*fname;
2448     krb5_context	kcontext;
2449     FILE		*filep;
2450     int			verbose;
2451     int			*linenop;
2452 {
2453      int nread;
2454      char rectype[100];
2455 
2456      nread = fscanf(filep, "%100s\t", rectype);
2457      if (nread == EOF)
2458 	  return -1;
2459      else if (nread != 1)
2460 	  return 1;
2461      if (strcmp(rectype, "princ") == 0)
2462 	  process_k5beta6_record(fname, kcontext, filep, verbose,
2463 				 linenop);
2464      else if (strcmp(rectype, "policy") == 0)
2465 	  process_k5beta7_policy(fname, kcontext, filep, verbose,
2466 				 linenop);
2467      else {
2468 		fprintf(stderr,
2469 		    gettext("unknown record type \"%s\" on line %d\n"),
2470 		  rectype, *linenop);
2471 	  return 1;
2472      }
2473 
2474      return 0;
2475 }
2476 
2477 /*
2478  * process_ov_record()	- Handle a dump record in OpenV*Secure 1.0 format.
2479  *
2480  * Returns -1 for end of file, 0 for success and 1 for failure.
2481  */
2482 static int
2483 process_ov_record(fname, kcontext, filep, verbose, linenop)
2484     char		*fname;
2485     krb5_context	kcontext;
2486     FILE		*filep;
2487     int			verbose;
2488     int			*linenop;
2489 {
2490      int nread;
2491      char rectype[100];
2492 
2493      nread = fscanf(filep, "%100s\t", rectype);
2494      if (nread == EOF)
2495 	  return -1;
2496      else if (nread != 1)
2497 	  return 1;
2498      if (strcmp(rectype, "princ") == 0)
2499 	  process_ov_principal(fname, kcontext, filep, verbose,
2500 			       linenop);
2501      else if (strcmp(rectype, "policy") == 0)
2502 	  process_k5beta7_policy(fname, kcontext, filep, verbose,
2503 				 linenop);
2504      else if (strcmp(rectype, "End") == 0)
2505 	  return -1;
2506      else {
2507 		fprintf(stderr,
2508 		    gettext("unknown record type \"%s\" on line %d\n"),
2509 		  rectype, *linenop);
2510 	  return 1;
2511      }
2512 
2513      return 0;
2514 }
2515 
2516 /*
2517  * restore_dump()	- Restore the database from any version dump file.
2518  */
2519 static int
2520 restore_dump(programname, kcontext, dumpfile, f, verbose, dump)
2521     char		*programname;
2522     krb5_context	kcontext;
2523     char		*dumpfile;
2524     FILE		*f;
2525     int			verbose;
2526     dump_version	*dump;
2527 {
2528     int		error;
2529     int		lineno;
2530 
2531     error = 0;
2532     lineno = 1;
2533 
2534     /*
2535      * Process the records.
2536      */
2537     while (!(error = (*dump->load_record)(dumpfile,
2538 					  kcontext,
2539 					  f,
2540 					  verbose,
2541 					  &lineno)))
2542 	 ;
2543     if (error != -1)
2544 		fprintf(stderr, gettext(err_line_fmt),
2545 		    programname, lineno, dumpfile);
2546     else
2547 	 error = 0;
2548 
2549     return(error);
2550 }
2551 
2552 /*
2553  * Usage: load_db [-i] [-old] [-ov] [-b6] [-b7] [-verbose] [-update] [-hash]
2554  *		filename
2555  */
2556 void
2557 load_db(argc, argv)
2558     int		argc;
2559     char	**argv;
2560 {
2561     kadm5_config_params newparams;
2562     krb5_error_code	kret;
2563     krb5_context	kcontext;
2564     FILE		*f;
2565     extern char		*optarg;
2566     extern int		optind;
2567 /* Solaris Kerberos */
2568 #if 0
2569     char		*programname;
2570 #endif
2571     char		*dumpfile;
2572     char		*dbname;
2573     char		*dbname_tmp;
2574     char		buf[BUFSIZ];
2575     dump_version	*load;
2576     int			update, verbose;
2577     krb5_int32		crflags;
2578     int			aindex;
2579     bool_t		add_update = TRUE;
2580     char		iheader[MAX_HEADER];
2581     uint32_t		caller, last_sno, last_seconds, last_useconds;
2582     kdb_log_context	*log_ctx;
2583     int			db_locked = 0;
2584 
2585     /*
2586      * Parse the arguments.
2587      */
2588 /* Solaris Kerberos */
2589 #if 0
2590     programname = argv[0];
2591     if (strrchr(programname, (int) '/'))
2592 	programname = strrchr(argv[0], (int) '/') + 1;
2593 #endif
2594     dumpfile = (char *) NULL;
2595     dbname = global_params.dbname;
2596     load = NULL;
2597     update = 0;
2598     verbose = 0;
2599     crflags = KRB5_KDB_CREATE_BTREE;
2600     exit_status = 0;
2601     dbname_tmp = (char *) NULL;
2602     log_ctx = util_context->kdblog_context;
2603 
2604     for (aindex = 1; aindex < argc; aindex++) {
2605 	if (!strcmp(argv[aindex], oldoption))
2606 	     load = &old_version;
2607 	else if (!strcmp(argv[aindex], b6option))
2608 	     load = &beta6_version;
2609 	else if (!strcmp(argv[aindex], b7option))
2610 	     load = &beta7_version;
2611 	else if (!strcmp(argv[aindex], ovoption))
2612 	     load = &ov_version;
2613 	else if (!strcmp(argv[aindex], ipropoption)) {
2614 			if (log_ctx && log_ctx->iproprole) {
2615 				load = &iprop_version;
2616 				add_update = FALSE;
2617 			} else {
2618 				fprintf(stderr, gettext("Iprop not enabled\n"));
2619 				exit_status++;
2620 				return;
2621 			}
2622 		}
2623 	else if (!strcmp(argv[aindex], verboseoption))
2624 	    verbose = 1;
2625 	else if (!strcmp(argv[aindex], updateoption))
2626 	    update = 1;
2627 	else if (!strcmp(argv[aindex], hashoption)) {
2628 	    if (!add_db_arg("hash=true")) {
2629 		com_err(progname, ENOMEM, "while parsing command arguments\n");
2630 		exit(1);
2631 	    }
2632 	} else
2633 	    break;
2634     }
2635     if ((argc - aindex) != 1) {
2636 	usage();
2637 	return;
2638     }
2639     dumpfile = argv[aindex];
2640 
2641     if (!(dbname_tmp = (char *) malloc(strlen(dbname)+
2642 				       strlen(dump_tmptrail)+1))) {
2643 		/* Solaris Kerberos */
2644 		fprintf(stderr, gettext(no_name_mem_fmt), progname);
2645 	exit_status++;
2646 	return;
2647     }
2648     strcpy(dbname_tmp, dbname);
2649     strcat(dbname_tmp, dump_tmptrail);
2650 
2651     /*
2652      * Initialize the Kerberos context and error tables.
2653      */
2654     if ((kret = kadm5_init_krb5_context(&kcontext))) {
2655 	/* Solaris Kerberos */
2656 	fprintf(stderr, gettext(ctx_err_fmt), progname);
2657 	free(dbname_tmp);
2658 	exit_status++;
2659 	return;
2660     }
2661 
2662     if( (kret = krb5_set_default_realm(kcontext, util_context->default_realm)) )
2663     {
2664 	/* Solaris Kerberos */
2665 	fprintf(stderr, gettext("%s: Unable to set the default realm\n"), progname);
2666 	free(dbname_tmp);
2667 	exit_status++;
2668 	return;
2669     }
2670     if (log_ctx && log_ctx->iproprole)
2671 	kcontext->kdblog_context = (void *)log_ctx;
2672     /*
2673      * Open the dumpfile
2674      */
2675     if (dumpfile) {
2676 	if ((f = fopen(dumpfile, "r")) == NULL) {
2677 			/* Solaris Kerberos */
2678 			fprintf(stderr, gettext(dfile_err_fmt),
2679 			    progname, dumpfile,
2680 		     error_message(errno));
2681 	     exit_status++;
2682 	     return;
2683 	}
2684 	if ((kret = krb5_lock_file(kcontext, fileno(f),
2685 				   KRB5_LOCKMODE_SHARED))) {
2686 	     /* Solaris Kerberos */
2687 	     fprintf(stderr, gettext("%s: Cannot lock %s: %s\n"), progname,
2688 		     dumpfile, error_message(errno));
2689 	     exit_status++;
2690 	     return;
2691 	}
2692     } else
2693 	f = stdin;
2694 
2695     /*
2696      * Auto-detect dump version if we weren't told, verify if we
2697      * were told.
2698      */
2699     fgets(buf, sizeof(buf), f);
2700     if (load) {
2701 	 /* only check what we know; some headers only contain a prefix */
2702 	 if (strncmp(buf, load->header, strlen(load->header)) != 0) {
2703 			/* Solaris Kerberos */
2704 			fprintf(stderr, gettext(head_bad_fmt), progname, dumpfile);
2705 	      exit_status++;
2706 	      if (dumpfile) fclose(f);
2707 	      return;
2708 	 }
2709     } else {
2710 	 /* perhaps this should be in an array, but so what? */
2711 	 if (strcmp(buf, old_version.header) == 0)
2712 	      load = &old_version;
2713 	 else if (strcmp(buf, beta6_version.header) == 0)
2714 	      load = &beta6_version;
2715 	 else if (strcmp(buf, beta7_version.header) == 0)
2716 	      load = &beta7_version;
2717 	 else if (strcmp(buf, r1_3_version.header) == 0)
2718 	      load = &r1_3_version;
2719 	 else if (strncmp(buf, ov_version.header,
2720 			  strlen(ov_version.header)) == 0)
2721 	      load = &ov_version;
2722 	 else {
2723 			/* Solaris Kerberos */
2724 			fprintf(stderr, gettext(head_bad_fmt),
2725 				progname, dumpfile);
2726 	      exit_status++;
2727 	      if (dumpfile) fclose(f);
2728 	      return;
2729 	 }
2730     }
2731     if (load->updateonly && !update) {
2732 		/* Solaris Kerberos */
2733 		fprintf(stderr,
2734 		    gettext("%s: dump version %s can only "
2735 			"be loaded with the -update flag\n"),
2736 		    progname, load->name);
2737 	 exit_status++;
2738 	 return;
2739     }
2740 
2741     /*
2742      * Cons up params for the new databases.  If we are not in update
2743      * mode, we create an alternate database and then promote it to
2744      * be the live db.
2745      */
2746     newparams = global_params;
2747     if (! update) {
2748 	 newparams.mask |= KADM5_CONFIG_DBNAME;
2749 	 newparams.dbname = dbname_tmp;
2750 
2751 	 if ((kret = kadm5_get_config_params(kcontext, 1,
2752 					     &newparams, &newparams))) {
2753 	      /* Solaris Kerberos */
2754 	      com_err(progname, kret,
2755 			    gettext("while retreiving new "
2756 				"configuration parameters"));
2757 	      exit_status++;
2758 	      return;
2759 	 }
2760 
2761 	 if (!add_db_arg("temporary")) {
2762 	     com_err(progname, ENOMEM, "computing parameters for database");
2763 	     exit(1);
2764 	 }
2765     }
2766 
2767     /*
2768      * If not an update restoration, create the database. otherwise open
2769      */
2770     if (!update) {
2771 	if((kret = krb5_db_create(kcontext, db5util_db_args))) {
2772 	    const char *emsg = krb5_get_error_message(kcontext, kret);
2773 	    /*
2774 	     * See if something (like DAL KDB plugin) has set a specific error
2775 	     * message and use that otherwise use default.
2776 	     */
2777 
2778 	    if (emsg != NULL) {
2779 		/* Solaris Kerberos */
2780 		fprintf(stderr, "%s: %s\n", progname, emsg);
2781 		krb5_free_error_message (kcontext, emsg);
2782 	    } else {
2783 		/* Solaris Kerberos */
2784 		fprintf(stderr, dbcreaterr_fmt,
2785 			progname, dbname, error_message(kret));
2786 	    }
2787 	    exit_status++;
2788 	    kadm5_free_config_params(kcontext, &newparams);
2789 	    if (dumpfile) fclose(f);
2790 	    return;
2791 	}
2792     }
2793     else {
2794 	    /*
2795 	     * Initialize the database.
2796 	     */
2797 	    if ((kret = krb5_db_open(kcontext, db5util_db_args,
2798 				     KRB5_KDB_OPEN_RW | KRB5_KDB_SRV_TYPE_ADMIN))) {
2799 		const char *emsg = krb5_get_error_message(kcontext, kret);
2800 		/*
2801 		 * See if something (like DAL KDB plugin) has set a specific
2802 		 * error message and use that otherwise use default.
2803 		 */
2804 
2805 		if (emsg != NULL) {
2806 		    /* Solaris Kerberos */
2807 		    fprintf(stderr, "%s: %s\n", progname, emsg);
2808 		    krb5_free_error_message (kcontext, emsg);
2809 		} else {
2810 		    /* Solaris Kerberos */
2811 		    fprintf(stderr, dbinit_err_fmt,
2812 			    progname, error_message(kret));
2813 		}
2814 		exit_status++;
2815 		goto error;
2816 	    }
2817     }
2818 
2819 
2820     /*
2821      * If an update restoration, make sure the db is left unusable if
2822      * the update fails.
2823      */
2824     if ((kret = krb5_db_lock(kcontext, update?KRB5_DB_LOCKMODE_PERMANENT: KRB5_DB_LOCKMODE_EXCLUSIVE))) {
2825 	/*
2826 	 * Ignore a not supported error since there is nothing to do about it
2827 	 * anyway.
2828 	 */
2829 	if (kret != KRB5_PLUGIN_OP_NOTSUPP) {
2830 	    /* Solaris Kerberos */
2831 	    fprintf(stderr, gettext("%s: %s while permanently locking database\n"),
2832 		    progname, error_message(kret));
2833 	    exit_status++;
2834 	    goto error;
2835 	}
2836     }
2837     else
2838 	db_locked = 1;
2839 
2840 	if (log_ctx && log_ctx->iproprole) {
2841 		if (add_update)
2842 			caller = FKCOMMAND;
2843 		else
2844 			caller = FKPROPD;
2845 
2846 		if (ulog_map(kcontext, &global_params, caller)) {
2847 			/* Solaris Kerberos */
2848 			fprintf(stderr,
2849 				gettext("%s: Could not map log\n"),
2850 				progname);
2851 			exit_status++;
2852 			goto error;
2853 		}
2854 
2855 		/*
2856 		 * We don't want to take out the ulog out from underneath
2857 		 * kadmind so we reinit the header log.
2858 		 *
2859 		 * We also don't want to add to the update log since we
2860 		 * are doing a whole sale replace of the db, because:
2861 		 * 	we could easily exceed # of update entries
2862 		 * 	we could implicity delete db entries during a replace
2863 		 *	no advantage in incr updates when entire db is replaced
2864 		 */
2865 		if (!update) {
2866                         memset(log_ctx->ulog, 0, sizeof (kdb_hlog_t));
2867 
2868                         log_ctx->ulog->kdb_hmagic = KDB_HMAGIC;
2869                         log_ctx->ulog->db_version_num = KDB_VERSION;
2870                         log_ctx->ulog->kdb_state = KDB_STABLE;
2871                         log_ctx->ulog->kdb_block = ULOG_BLOCK;
2872 
2873 			log_ctx->iproprole = IPROP_NULL;
2874 
2875 			if (!add_update) {
2876 				sscanf(buf, "%s %u %u %u", iheader, &last_sno,
2877 					&last_seconds, &last_useconds);
2878 
2879 				log_ctx->ulog->kdb_last_sno = last_sno;
2880 				log_ctx->ulog->kdb_last_time.seconds =
2881 				    last_seconds;
2882 				log_ctx->ulog->kdb_last_time.useconds =
2883 				    last_useconds;
2884 			}
2885 		}
2886 	}
2887 
2888     /* Solaris Kerberos */
2889     if (restore_dump(progname, kcontext, (dumpfile) ? dumpfile : stdin_name,
2890 		     f, verbose, load)) {
2891 	 /* Solaris Kerberos */
2892 	 fprintf(stderr, gettext(restfail_fmt),
2893 		 progname, load->name);
2894 	 exit_status++;
2895     }
2896 
2897     if (!update && load->create_kadm5 &&
2898 	((kret = kadm5_create_magic_princs(&newparams, kcontext)))) {
2899 	 /* error message printed by create_magic_princs */
2900 	 exit_status++;
2901     }
2902 
2903     if (db_locked && (kret = krb5_db_unlock(kcontext))) {
2904 	 /* change this error? */
2905 		/* Solaris Kerberos */
2906 		fprintf(stderr, gettext(dbunlockerr_fmt),
2907 		 progname, dbname, error_message(kret));
2908 	 exit_status++;
2909     }
2910 
2911 #if 0
2912     if ((kret = krb5_db_fini(kcontext))) {
2913 		/* Solaris Kerberos */
2914 		fprintf(stderr, gettext(close_err_fmt),
2915 		 progname, error_message(kret));
2916 	 exit_status++;
2917     }
2918 #endif
2919 
2920     /* close policy db below */
2921 
2922     if (exit_status == 0 && !update) {
2923 	kret = krb5_db_promote(kcontext, db5util_db_args);
2924 	/*
2925 	 * Ignore a not supported error since there is nothing to do about it
2926 	 * anyway.
2927 	 */
2928 	if (kret != 0 && kret != KRB5_PLUGIN_OP_NOTSUPP) {
2929 	    /* Solaris Kerberos */
2930 	    fprintf(stderr, gettext("%s: cannot make newly loaded database live (%s)\n"),
2931 		    progname, error_message(kret));
2932 	    exit_status++;
2933 	}
2934     }
2935 
2936 error:
2937     /*
2938      * If not an update: if there was an error, destroy the temp database,
2939      * otherwise rename it into place.
2940      *
2941      * If an update: if there was no error, unlock the database.
2942      */
2943     if (!update) {
2944 	 if (exit_status) {
2945 	      kret = krb5_db_destroy(kcontext, db5util_db_args);
2946 	      /*
2947 	       * Ignore a not supported error since there is nothing to do about
2948 	       * it anyway.
2949 	       */
2950 	      if (kret != 0 && kret != KRB5_PLUGIN_OP_NOTSUPP) {
2951 		   /* Solaris Kerberos */
2952 		   fprintf(stderr, gettext(dbdelerr_fmt),
2953 			   progname, dbname, error_message(kret));
2954 		   exit_status++;
2955 	      }
2956 	 }
2957     }
2958 
2959     if (dumpfile) {
2960 	 (void) krb5_lock_file(kcontext, fileno(f), KRB5_LOCKMODE_UNLOCK);
2961 	 fclose(f);
2962     }
2963 
2964     if (dbname_tmp)
2965 	 free(dbname_tmp);
2966     krb5_free_context(kcontext);
2967 }
2968